33 resultados para Actor-Network theory


Relevância:

30.00% 30.00%

Publicador:

Resumo:

Servitization involves manufacturers developing service offerings to grow revenue and profit. Advanced services, in particular, can facilitate a more service-focused organization and impact customers' business processes significantly. However, approaches to servitization are often discussed solely from the manufacturer's perspective; overlooking the role of other network actors. Adopting a multi-actor perspective, this study investigates manufacturer, intermediary and customer perspectives to identify complementary and competing capabilities within a manufacturer's downstream network, required for advanced services. Interviews were conducted with 24 senior executives in 19 UK-based manufacturers, intermediaries and customers across multiple sectors. The study identified six key business activities, within which advanced services capabilities were grouped. The unique and critical capabilities for advanced services for each actor were identified as follows: manufacturers; the need to balance product and service innovation, developing customer-focused through-life service methodologies and having distinct, yet synergistic product and service cultures; intermediaries, the coordination and integration of third party products/services; customers, co-creating innovation and having processes supporting service outsourcing. The study is unique in highlighting the distinct roles of different actors in the provision of advanced services and shows that they can only be developed and delivered by the combination of complex interconnected capabilities found within a network.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Purpose: The purpose of the research described in this paper is to disentangle the rhetoric from the reality in relation to supply chain management (SCM) adoption in practice. There is significant evidence of a divergence between theory and practice in the field of SCM. Research Approach: The authors’ review of the extant SCM literature highlighted a lack of replication studies in SCM, leading to the concept of refined replication being developed. The authors conducted a refined replication of the work of Sweeney et al. (2015) where a new SCM definitional construct – the Four Fundamentals – was proposed. The work presented in this article refines the previous study but adopts the same three-phase approach: focussed interviews, a questionnaire survey, and focus groups. This article covers the second phase of the refined replication study and describes an integrated research design of a questionnaire research to be undertaken in Britain. Findings and Originality: The article presents an integrated research design of a questionnaire research with emphases on the refined replication of previous work of Sweeney et al. (2015) carried out in Ireland and adapting it to the British context. Research Impact: The authors introduce the concept of refined replication in SCM research. This allows previous research to be built upon in order to test understanding of SCM theory and its practical implementation - based on the Four Fundamentals construct - among SCM professionals in Britain. Practical Impact: The article presents the integrated research design of a questionnaire research that may be used in similar studies.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The protection of cyberspace has become one of the highest security priorities of governments worldwide. The EU is not an exception in this context, given its rapidly developing cyber security policy. Since the 1990s, we could observe the creation of three broad areas of policy interest: cyber-crime, critical information infrastructures and cyber-defence. One of the main trends transversal to these areas is the importance that the private sector has come to assume within them. In particular in the area of critical information infrastructure protection, the private sector is seen as a key stakeholder, given that it currently operates most infrastructures in this area. As a result of this operative capacity, the private sector has come to be understood as the expert in network and information systems security, whose knowledge is crucial for the regulation of the field. Adopting a Regulatory Capitalism framework, complemented by insights from Network Governance, we can identify the shifting role of the private sector in this field from one of a victim in need of protection in the first phase, to a commercial actor bearing responsibility for ensuring network resilience in the second, to an active policy shaper in the third, participating in the regulation of NIS by providing technical expertise. By drawing insights from the above-mentioned frameworks, we can better understand how private actors are involved in shaping regulatory responses, as well as why they have been incorporated into these regulatory networks.