20 resultados para carriage service provider
Resumo:
Increased competition, geographically expanded marketplaces, technology replication and an ever discerning consumer base, are reasons why companies need to regularly reappraise their competencies in terms of activities and functions they perform themselves. Where viable alternatives exist, companies should consider outsourcing of non-core activities and functions. Within SCM (Supply Chain Management) it could be preferable if a “one stop shop” existed for companies seeking to outsource functions identified as non-core. “Traditionally” structured LSP’s who have concentrated their service offer around providing warehousing and transport activities are potentially at a crossroads – clients and potential clients requiring “new” services which could increase LSP’s revenues if provided, whilst failure to provide could perhaps result in clients seeking outsourced services elsewhere.
Resumo:
This study is about the role and operation of ‘third sector’ organisations (TSOs) within the Taiwanese social welfare context. TSOs have increased dramatically and become actively involved in social service provision. This phenomenon has not only had significant impact on the development and operation of TSOs in Taiwan but it is also of increasing interest to public policy academics. The latter are especially interested in the implications for the government-third sector relationship. This research examines the reasons why TSOs have been established, why they actively participate in social service provision, and their role and operation within the social welfare context of Taiwan. The study has both quantitative and qualitative data. It sampled ‘social service’ and ‘charitable’ organisations (SSCOs), which are the main type of TSOs in Taiwan, to examine their role, operation and interaction with government. Questionnaires were mailed to collect quantitative data first. After the quantitative data were collected and analysed, semi-structured interviews were undertaken to collect qualitative data. The study found that TSOs in Taiwan exist in a highly institutionalised environment, which is affected by traditional Confucian ideas and contemporary Western ideas such as social justice and civil rights. The rapid growth of TSOs has a strong connection with the desire to fill social service gaps left by government and family. TSOs mainly play the role of service provider rather than that of advocate. They cooperate with government in social service provision and have developed different types of symbiotic relationships with government. A ‘resonance effect’ between government and TSOs was also found as they implement social policy.
Resumo:
Purpose: The purpose of this paper is to understand how reverse resource exchanges and resource dependencies are managed in the service supply chain (SSC) of returnable transport packaging (RTP). Design/methodology/approach: A single case study was conducted in the context of automotive logistics focusing on the RTP SSC. Data were collected through 16 interviews, primarily with managers of a logistics service provider (LSP) and document analysis of contractual agreements with key customers of the packaging service. Findings: Resource dependencies among actors in the SSC result from the importance of the RTP for the customer’s production processes, the competition among users for RTP and the negative implications of the temporary unavailability of RTP for customers and the LSP (in terms of service performance). Amongst other things, the LSP is dependent on its customers and third-party users (e.g. the customer’s suppliers) for the timely return of package resources. The role of inter-firm integration and collaboration, formal contracts as well as customers’ power and influence over third-party RTP users are stressed as key mechanisms for managing LSP’s resource dependencies. Research limitations/implications: A resource dependence theory (RDT) lens is used to analyse how reverse resource exchanges and associated resource dependencies in SSCs are managed, thus complementing the existing SSC literature emphasising the bi-directionality of resource flows. The study also extends the recent SSC literature stressing the role of contracting by empirically demonstrating how formal contracts can be mobilised to explicate resource dependencies and to specify, and regulate, reverse exchanges in the SSC. Practical implications: The research suggests that logistics providers can effectively manage their resource dependencies and regulate reverse exchanges in the SSC by deploying contractual governance mechanisms and leveraging their customers’ influence over third-party RTP users. Originality/value: The study is novel in its application of RDT, which enhances our understanding of the management of reverse exchanges and resource dependencies in SSCs.
Resumo:
Technological advancements enable new sourcing models in software development such as cloud computing, software-as-a-service, and crowdsourcing. While the first two are perceived as a re-emergence of older models (e.g., ASP), crowdsourcing is a new model that creates an opportunity for a global workforce to compete with established service providers. Organizations engaging in crowdsourcing need to develop the capabilities to successfully utilize this sourcing model in delivering services to their clients. To explore these capabilities we collected qualitative data from focus groups with crowdsourcing leaders at a large technology organization. New capabilities we identified stem from the need of the traditional service provider to assume a "client" role in the crowdsourcing context, while still acting as a "vendor" in providing services to the end client. This paper expands the research on vendor capabilities and IS outsourcing as well as offers important insights to organizations that are experimenting with, or considering, crowdsourcing.
Resumo:
Crowdsourcing platforms that attract a large pool of potential workforce allow organizations to reduce permanent staff levels. However managing this "human cloud" requires new management models and skills. Therefore, Information Technology (IT) service providers engaging in crowdsourcing need to develop new capabilities to successfully utilize crowdsourcing in delivering services to their clients. To explore these capabilities we collected qualitative data from focus groups with crowdsourcing leaders at a large multinational technology organization. New capabilities we identified stem from the need of the traditional service provider to assume a "client" role in the crowdsourcing context, while still acting as a "vendor" in providing services to the end-client. This paper expands the research on vendor capabilities and IT outsourcing as well as offers important insights to organizations that are experimenting with, or considering, crowdsourcing. © 2014 Elsevier B.V. All rights reserved.
Resumo:
The Internet has become a universal communication network tool. It has evolved from a platform that supports best-effort traffic to one that now carries different traffic types including those involving continuous media with quality of service (QoS) requirements. As more services are delivered over the Internet, we face increasing risk to their availability given that malicious attacks on those Internet services continue to increase. Several networks have witnessed denial of service (DoS) and distributed denial of service (DDoS) attacks over the past few years which have disrupted QoS of network services, thereby violating the Service Level Agreement (SLA) between the client and the Internet Service Provider (ISP). Hence DoS or DDoS attacks are major threats to network QoS. In this paper we survey techniques and solutions that have been deployed to thwart DoS and DDoS attacks and we evaluate them in terms of their impact on network QoS for Internet services. We also present vulnerabilities that can be exploited for QoS protocols and also affect QoS if exploited. In addition, we also highlight challenges that still need to be addressed to achieve end-to-end QoS with recently proposed DoS/DDoS solutions. © 2010 John Wiley & Sons, Ltd.
Resumo:
The advent of personal communication systems within the last decade has depended upon the utilization of advanced digital schemes for source and channel coding and for modulation. The inherent digital nature of the communications processing has allowed the convenient incorporation of cryptographic techniques to implement security in these communications systems. There are various security requirements, of both the service provider and the mobile subscriber, which may be provided for in a personal communications system. Such security provisions include the privacy of user data, the authentication of communicating parties, the provision for data integrity, and the provision for both location confidentiality and party anonymity. This thesis is concerned with an investigation of the private-key and public-key cryptographic techniques pertinent to the security requirements of personal communication systems and an analysis of the security provisions of Second-Generation personal communication systems is presented. Particular attention has been paid to the properties of the cryptographic protocols which have been employed in current Second-Generation systems. It has been found that certain security-related protocols implemented in the Second-Generation systems have specific weaknesses. A theoretical evaluation of these protocols has been performed using formal analysis techniques and certain assumptions made during the development of the systems are shown to contribute to the security weaknesses. Various attack scenarios which exploit these protocol weaknesses are presented. The Fiat-Sharmir zero-knowledge cryptosystem is presented as an example of how asymmetric algorithm cryptography may be employed as part of an improved security solution. Various modifications to this cryptosystem have been evaluated and their critical parameters are shown to be capable of being optimized to suit a particular applications. The implementation of such a system using current smart card technology has been evaluated.
Resumo:
Purpose: Previous research has emphasized the pivotal role that salespeople play in customer satisfaction. In this regard, the relationship between salespeople's attitudes, skills, and characteristics, and customer satisfaction remains an area of interest. The paper aims to make three contributions: first, it seeks to examine the impact of salespeople's satisfaction, adaptive selling, and dominance on customer satisfaction. Second, this research aims to use dyadic data, which is a better test of the relationships between constructs since it avoids common method variance. Finally, in contrast to previous research, it aims to test all of the customers of salespeople rather than customers selected by salespeople. Design/methodology/approach: The study employs multilevel analysis to examine the relationship between salespeople's satisfaction with the firm on customer satisfaction, using a dyadic, matched business-to-business sample of a large European financial service provider that comprises 188 customers and 18 employees. Findings: The paper finds that customers' evaluation of service quality, product quality, and value influence customer satisfaction. The analysis at the selling firm's employee level shows that adaptive selling and employee satisfaction positively impact customer satisfaction, while dominance is negatively related to customer satisfaction. Practical implications: Research shows that customer-focus is a key driver in the success of service companies. Customer satisfaction is regarded as a prerequisite for establishing long-term, profitable relations between company and customer, and customer contact employees are key to nurturing this relationship. The role of salespeople's attitudes, skills, and characteristics in the customer satisfaction process are highlighted in this paper. Originality/value: The use of dyadic, multilevel studies to assess the nature of the relationship between employees and customers is, to date, surprisingly limited. The paper examines the link between employee attitudes, skills, and characteristics, and customer satisfaction in a business-to-business setting in the financial service sector, differentiating between customer- and employee-level drivers of business customer satisfaction.
Resumo:
Enterprise resource planning (ERP) projects are risky. But if they are implemented appropriately, they can provide competitive advantage to organisations. Therefore, ERP implementation has become one of the most critical aspects of today's information management research. The main purpose of this article is to describe a new ERP risk assessment framework (RAF) that can be used to increase the success of ERP implementation. In this article, through a case study based in a leading UK-based energy service provider, we demonstrate the new RAF, which has been shown to help identify and mitigate risks in ERP implementation. In contrast to other research, this RAF identifies risks hierarchically in external engagement, programme management, work stream and work package levels across technical, schedule, operational, business and organisational categories. This not only helped to develop responses to mitigate risks but also facilitates on-going risk control.
Resumo:
As microblog services such as Twitter become a fast and convenient communication approach, identification of trendy topics in microblog services has great academic and business value. However detecting trendy topics is very challenging due to huge number of users and short-text posts in microblog diffusion networks. In this paper we introduce a trendy topics detection system under computation and communication resource constraints. In stark contrast to retrieving and processing the whole microblog contents, we develop an idea of selecting a small set of microblog users and processing their posts to achieve an overall acceptable trendy topic coverage, without exceeding resource budget for detection. We formulate the selection operation of these subset users as mixed-integer optimization problems, and develop heuristic algorithms to compute their approximate solutions. The proposed system is evaluated with real-time test data retrieved from Sina Weibo, the dominant microblog service provider in China. It's shown that by monitoring 500 out of 1.6 million microblog users and tracking their microposts (about 15,000 daily) with our system, nearly 65% trendy topics can be detected, while on average 5 hours earlier before they appear in Sina Weibo official trends.
Resumo:
In today's supply chain management practices, a successful strategy depends increasingly on the performance of third party logistics (3PLs) providers as they play a key integrative role linking the different supply chain elements more effectively. Information and communications technology (ICT) has become an important element of 3PL competitive capability as it enables higher levels of supply chain integration. Recent industry developments have widened the technological gap between large and small 3PLs. This is critical particularly for those markets populated by a large number of small 3PLs such as the Italian logistics industry. The purpose of this paper is to provide an overview of ICT adoption in small logistics service providers. The focus of the study is the Italian 3PL market. The methodology adopted in this paper is based on the action research framework and it is a combination of theoretical analysis and empirical findings (focus groups and surveys). Firstly, a literature review on ICT dissemination in the international and Italian 3PL industry has been carried out. Then, a field survey has been developed preceded by two focus groups. The empirical investigation examined a sample of 153 small Italian 3PLs on the base of a definition and taxonomy proposed by the authors. The results provide a useful technological profile of the surveyed companies, as well as an analysis of the role of ICT in customising services and of the factors influencing ICT adoption. To give a more robust scientific justification of the survey results, it would be useful to carry out an additional large-scale analysis including other countries with a high presence of small logistics service companies. Furthermore, a complementary case-study analysis would be of help in defining the role of specific factors in different types of 3PL. Further investigations in this field are needed to better understand innovation paths, and how ICT can improve the competitive capabilities of 3PLs and of the wider supply chain. Managers of small 3PLs can use the findings to set-up guidelines for improving a company's technology innovation. Technology vendors can use the findings to better market their service/product into the small logistics service provider segment. Despite the fact that much has been written about the dissemination of ICT, there is still a shortage of research in the field of small 3PLs with little empirical investigation into the usage of ICT by small 3PLs. This paper provides a contribution to filling this void and suggests some possible research directions.
Resumo:
Transportation service operators are witnessing a growing demand for bi-directional movement of goods. Given this, the following thesis considers an extension to the vehicle routing problem (VRP) known as the delivery and pickup transportation problem (DPP), where delivery and pickup demands may occupy the same route. The problem is formulated here as the vehicle routing problem with simultaneous delivery and pickup (VRPSDP), which requires the concurrent service of the demands at the customer location. This formulation provides the greatest opportunity for cost savings for both the service provider and recipient. The aims of this research are to propose a new theoretical design to solve the multi-objective VRPSDP, provide software support for the suggested design and validate the method through a set of experiments. A new real-life based multi-objective VRPSDP is studied here, which requires the minimisation of the often conflicting objectives: operated vehicle fleet size, total routing distance and the maximum variation between route distances (workload variation). The former two objectives are commonly encountered in the domain and the latter is introduced here because it is essential for real-life routing problems. The VRPSDP is defined as a hard combinatorial optimisation problem, therefore an approximation method, Simultaneous Delivery and Pickup method (SDPmethod) is proposed to solve it. The SDPmethod consists of three phases. The first phase constructs a set of diverse partial solutions, where one is expected to form part of the near-optimal solution. The second phase determines assignment possibilities for each sub-problem. The third phase solves the sub-problems using a parallel genetic algorithm. The suggested genetic algorithm is improved by the introduction of a set of tools: genetic operator switching mechanism via diversity thresholds, accuracy analysis tool and a new fitness evaluation mechanism. This three phase method is proposed to address the shortcoming that exists in the domain, where an initial solution is built only then to be completely dismantled and redesigned in the optimisation phase. In addition, a new routing heuristic, RouteAlg, is proposed to solve the VRPSDP sub-problem, the travelling salesman problem with simultaneous delivery and pickup (TSPSDP). The experimental studies are conducted using the well known benchmark Salhi and Nagy (1999) test problems, where the SDPmethod and RouteAlg solutions are compared with the prominent works in the VRPSDP domain. The SDPmethod has demonstrated to be an effective method for solving the multi-objective VRPSDP and the RouteAlg for the TSPSDP.
Learning and change in interorganizational networks:the case for network learning and network change
Resumo:
The ALBA 2002 Call for Papers asks the question ‘How do organizational learning and knowledge management contribute to organizational innovation and change?’. Intuitively, we would argue, the answer should be relatively straightforward as links between learning and change, and knowledge management and innovation, have long been commonly assumed to exist. On the basis of this assumption, theories of learning tend to focus ‘within organizations’, and assume a transfer of learning from individual to organization which in turn leads to change. However, empirically, we find these links are more difficult to articulate. Organizations exist in complex embedded economic, political, social and institutional systems, hence organizational change (or innovation) may be influenced by learning in this wider context. Based on our research in this wider interorganizational setting, we first make the case for the notion of network learning that we then explore to develop our appreciation of change in interorganizational networks, and how it may be facilitated. The paper begins with a brief review of lite rature on learning in the organizational and interorganizational context which locates our stance on organizational learning versus the learning organization, and social, distributed versus technical, centred views of organizational learning and knowledge. Developing from the view that organizational learning is “a normal, if problematic, process in every organization” (Easterby-Smith, 1997: 1109), we introduce the notion of network learning: learning by a group of organizations as a group. We argue this is also a normal, if problematic, process in organizational relationships (as distinct from interorganizational learning), which has particular implications for network change. Part two of the paper develops our analysis, drawing on empirical data from two studies of learning. The first study addresses the issue of learning to collaborate between industrial customers and suppliers, leading to the case for network learning. The second, larger scale study goes on to develop this theme, examining learning around several major change issues in a healthcare service provider network. The learning processes and outcomes around the introduction of a particularly controversial and expensive technology are described, providing a rich and contrasting case with the first study. In part three, we then discuss the implications of this work for change, and for facilitating change. Conclusions from the first study identify potential interventions designed to facilitate individual and organizational learning within the customer organization to develop individual and organizational ‘capacity to collaborate’. Translated to the network example, we observe that network change entails learning at all levels – network, organization, group and individual. However, presenting findings in terms of interventions is less meaningful in an interorganizational network setting given: the differences in authority structures; the less formalised nature of the network setting; and the importance of evaluating performance at the network rather than organizational level. Academics challenge both the idea of managing change and of managing networks. Nevertheless practitioners are faced with the issue of understanding and in fluencing change in the network setting. Thus we conclude that a network learning perspective is an important development in our understanding of organizational learning, capability and change, locating this in the wider context in which organizations are embedded. This in turn helps to develop our appreciation of facilitating change in interorganizational networks, both in terms of change issues (such as introducing a new technology), and change orientation and capability.
Resumo:
Purpose – This paper describes a “work in progress” research project being carried out with a public health care provider in the UK, a large NHS hospital Trust. Enhanced engagement with patients is one of the Trust’s core principles, but it is recognised that much more needs to be done to achieve this, and that ICT systems may be able to provide some support. The project is intended to find ways to better capture and evaluate the “voice of the patient” in order to lead to improvements in health care quality, safety and effectiveness. Design/methodology/approach – We propose to investigate the use of a patient-orientated knowledge management system (KMS) in managing knowledge about and from patients. The study is a mixed methods (quantitative and qualitative) investigation based on traditional action research, intended to answer the following three research questions: (1) How can a KMS be used as a mechanism to capture and evaluate patient experiences to provoke patient service change (2) How can the KMS assist in providing a mechanism for systematising patient engagement? (3) How can patient feedback be used to stimulate improvements in care, quality and safety? Originality/value –This methodology aims to involve patients at all phases of the study from its initial design onwards, thus leading to an understanding of the issues associated with using a KMS to manage knowledge about and for patients that is driven by the patients themselves. Practical implications – The outcomes of the project for the collaborating hospital will be firstly, a system for capturing and evaluating knowledge about and from patients, and then as a consequence, improved outcomes for both the patients and the service provider. More generally, it will produce a set of guidelines for managing patient knowledge in an NHS hospital that have been tested in one case example.
Resumo:
Spamming has been a widespread problem for social networks. In recent years there is an increasing interest in the analysis of anti-spamming for microblogs, such as Twitter. In this paper we present a systematic research on the analysis of spamming in Sina Weibo platform, which is currently a dominant microblogging service provider in China. Our research objectives are to understand the specific spamming behaviors in Sina Weibo and find approaches to identify and block spammers in Sina Weibo based on spamming behavior classifiers. To start with the analysis of spamming behaviors we devise several effective methods to collect a large set of spammer samples, including uses of proactive honeypots and crawlers, keywords based searching and buying spammer samples directly from online merchants. We processed the database associated with these spammer samples and interestingly we found three representative spamming behaviors: Aggressive advertising, repeated duplicate reposting and aggressive following. We extract various features and compare the behaviors of spammers and legitimate users with regard to these features. It is found that spamming behaviors and normal behaviors have distinct characteristics. Based on these findings we design an automatic online spammer identification system. Through tests with real data it is demonstrated that the system can effectively detect the spamming behaviors and identify spammers in Sina Weibo.