67 resultados para knowledge intensive business services


Relevância:

100.00% 100.00%

Publicador:

Resumo:

The Narver and Slater market orientation scale is tested in the context of service firms in the transition economies of central Europe and found to be both valid and reliable. The survey examined levels of market orientation in 205 business to business services companies and 141 consumer services companies in Hungary, Poland and Slovenia. As predicted by the predominantly western marketing literature, those service firms with higher levels of market orientation; were more often found in turbulent, rapidly changing markets; were more likely to pursue longer term market building goals rather than short term efficiency objectives; more likely to pursue differentiated positioning through offering superior levels of service compared to competitors; and also performed better on both financial and market based criteria. A number of different business approaches, however, are evident in the transition economies suggesting that other business orientations may co-exist with a market orientation creating a richer and more complex set of organizational drivers.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Innovation events – the introduction of new products or processes – represent the end of a process of knowledge sourcing and transformation. They also represent the beginning of a process of exploitation which may result in an improvement in the performance of the innovating business. This recursive process of knowledge sourcing, transformation and exploitation comprises the innovation value chain. Modelling the innovation value chain for a large group of manufacturing firms in Ireland and Northern Ireland highlights the drivers of innovation, productivity and firm growth. In terms of knowledge sourcing,we find strong complementarity between horizontal, forwards, backwards, public and internal knowledge sourcing activities. Each of these forms of knowledge sourcing also makes a positive contribution to innovation in both products and processes although public knowledge sources have only an indirect effect on innovation outputs. In the exploitation phase, innovation in both products and processes contribute positively tocompany growth, with product innovation having a short-term ‘disruption’ effect on labour productivity. Modelling the complete innovation value chain highlights the structure and complexity of the process of translating knowledge into business value and emphasises the role of skills, capital investment and firms’ other resources in the value creation process.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

As information and communications technology (ICT) involves both traditional capital and knowledge capital, potential spillovers through various mechanisms can occur. We posit that ICT capital may boost productivity growth, not only in the home country, but also in other countries. In this paper, we provide empirical evidence of such spillovers using panel data on 37 countries from 1996 to 2004. Our results support the existence of ICT spillovers across country borders. Furthermore, we find that developing countries could reap more benefits from ICT spillovers than developed countries. This is particularly important for policy decisions regarding national trade liberalization and economic integration. Developing economies that are more open to foreign trade may have an economic advantage and may develop knowledge-intensive activities, which will lead to economic development in the long run.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Innovation events - the introduction of new products or processes - represent the end of a process of knowledge sourcing and transformation. They also represent the beginning of a process of exploitation which may result in an improvement in the performance of the innovating business. This recursive process of knowledge sourcing, transformation and exploitation we call the innovation value chain. Modelling the innovation value chain for a large group of manufacturing firms in Ireland and Northern Ireland highlights the drivers of innovation, productivity and firm growth. In terms of knowledge sourcing, we find strong complementarity between horizontal, forwards, backwards, public and internal knowledge sourcing activities. Each of these forms of knowledge sourcing also makes a positive contribution to innovation in both products and processes although public knowledge sources have only an indirect effect on innovation outputs. In the exploitation phase, innovation in both products and processes contribute positively to company growth, with product innovation having a short-term ‘disruption’ effect on labour productivity. Modelling the complete innovation value chain highlights the structure and complexity of the process of translating knowledge into business value and emphasises the role of skills, capital investment and firms’ other resources in the value creation process.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This chapter provides the theoretical foundation and background on data envelopment analysis (DEA) method. We first introduce the basic DEA models. The balance of this chapter focuses on evidences showing DEA has been extensively applied for measuring efficiency and productivity of services including financial services (banking, insurance, securities, and fund management), professional services, health services, education services, environmental and public services, energy services, logistics, tourism, information technology, telecommunications, transport, distribution, audio-visual, media, entertainment, cultural and other business services. Finally, we provide information on the use of Performance Improvement Management Software (PIM-DEA). A free limited version of this software and downloading procedure is also included in this chapter.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The research consists of three empirical studies. The first examines how source country characteristics affect the aggregate FDI inflows in the Japanese economy during the period of 1989-2002. Our results demonstrate that the stable investment climate of the home country is an essential factor indicating FDI inflows to Japan. By contrast, the export performance of the source country is negatively correlated with FDI inflows, indicating that international trade and FDI are substitutes. The second study identifies the determinants of foreign penetration across Japanese manufacturing sectors at the three-digit level during the period of 1997-2003. More importantly, this study examines the moderating effects of keiretsu affiliations on the relationship between various sectoral characteristics and foreign participation. The evidence of both horizontal and vertical keiretsu impacts on foreign penetration depends on not only different proxy measures used for inward FDI, but also on the level of technological sophistication in given sectors. In general, our results demonstrate that horizontally linked keiretsu are positively associated with foreign productions in knowledge-intensive sectors. By contrast, this effect becomes a significant entry barrier to foreign employment in low-tech sectors. The final study evaluates the impacts of a foreign presence on the productivity of Japanese manufacturing firms over the period of 1997-2003. Our results suggest that spillover effects largely differ according to the level of absorptive capacity of indigenous firms.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This paper explains how dynamic client portfolios can be a source of ambidexterity (i.e., exploration and exploitation) for knowledge-intensive firms (KIFs). Drawing from a unique qualitative dataset of firms in the global reinsurance market, we show how different types of client relationships underpin a dynamic client portfolio and become a source of ambidexterity for a KIF. We develop a process model to show how KIFs attain knowledge by segmenting their client portfolios, use that knowledge to explore and exploit within and across their client relationships, and dynamically adjust their client portfolios over time. Our study contributes to the literature on external sources of ambidexterity and dynamic management of client knowledge within KIFs.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Increasingly users are seen as the weak link in the chain, when it comes to the security of corporate information. Should the users of computer systems act in any inappropriate or insecure manner, then they may put their employers in danger of financial losses, information degradation or litigation, and themselves in danger of dismissal or prosecution. This is a particularly important concern for knowledge-intensive organisations, such as universities, as the effective conduct of their core teaching and research activities is becoming ever more reliant on the availability, integrity and accuracy of computer-based information resources. One increasingly important mechanism for reducing the occurrence of inappropriate behaviours, and in so doing, protecting corporate information, is through the formulation and application of a formal ‘acceptable use policy (AUP). Whilst the AUP has attracted some academic interest, it has tended to be prescriptive and overly focussed on the role of the Internet, and there is relatively little empirical material that explicitly addresses the purpose, positioning or content of real acceptable use policies. The broad aim of the study, reported in this paper, is to fill this gap in the literature by critically examining the structure and composition of a sample of authentic policies – taken from the higher education sector – rather than simply making general prescriptions about what they ought to contain. There are two important conclusions to be drawn from this study: (1) the primary role of the AUP appears to be as a mechanism for dealing with unacceptable behaviour, rather than proactively promoting desirable and effective security behaviours, and (2) the wide variation found in the coverage and positioning of the reviewed policies is unlikely to be fostering a coherent approach to security management, across the higher education sector.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Ensuring the security of corporate information, that is increasingly stored, processed and disseminated using information and communications technologies [ICTs], has become an extremely complex and challenging activity. This is a particularly important concern for knowledge-intensive organisations, such as universities, as the effective conduct of their core teaching and research activities is becoming ever more reliant on the availability, integrity and accuracy of computer-based information resources. One increasingly important mechanism for reducing the occurrence of security breaches, and in so doing, protecting corporate information, is through the formulation and application of a formal information security policy (InSPy). Whilst a great deal has now been written about the importance and role of the information security policy, and approaches to its formulation and dissemination, there is relatively little empirical material that explicitly addresses the structure or content of security policies. The broad aim of the study, reported in this paper, is to fill this gap in the literature by critically examining the structure and content of authentic information security policies, rather than simply making general prescriptions about what they ought to contain. Having established the structure and key features of the reviewed policies, the paper critically explores the underlying conceptualisation of information security embedded in the policies. There are two important conclusions to be drawn from this study: (1) the wide diversity of disparate policies and standards in use is unlikely to foster a coherent approach to security management; and (2) the range of specific issues explicitly covered in university policies is surprisingly low, and reflects a highly techno-centric view of information security management.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This edited book is intended for use by students, academics and practitioners who take interest in the outsourcing and offshoring of information technology and business services and processes. The book offers a review of the key topics in outsourcing and offshoring, populated with practical frameworks that serve as a tool kit for practitioners, academics and students. The range of topics covered in this book is wide and diverse, and represents both client and supplier perspectives on sourcing of global services. Various aspects related to the decision making process (e.g., asset transfer), learning mechanisms and organizational practices for managing outsourcing relationships are discussed in great depth. Contemporary sourcing models, including cloud services, are examined. Client dependency on the outsourcing provider, and social aspects, such as identity, are discussed in detail. Furthermore, resistance in outsourcing and failures are investigated to derive lessons as to how to avoid them and improve efficiency in outsourcing. Topics discussed in this book combine theoretical and practical insights regarding challenges that both clients and vendors face. Case studies from client and vendor organizations are used extensively throughout the book. Last but not least, the book examines current and future trends in outsourcing and offshoring, placing particular attention on the centrality of innovation in sourcing arrangements, and how innovation can be realized in outsourcing. The book is based on a vast empirical base brought together through years of extensive research by leading researchers in information systems, strategic management and operations.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This edited book is intended for use by students, academics and practitioners who take interest in the outsourcing and offshoring of information technology and business services and processes. The book offers a review of the key topics in outsourcing and offshoring, populated with practical frameworks that serve as a tool kit for practitioners, academics and students. The range of topics covered in this book is wide and diverse, and represents both client and supplier perspectives on sourcing of global services. Various aspects related to the decision making process (e.g., asset transfer), learning mechanisms and organizational practices for managing outsourcing relationships are discussed in great depth. Contemporary sourcing models, including cloud services, are examined. Client dependency on the outsourcing provider, and social aspects, such as identity, are discussed in detail. Furthermore, resistance in outsourcing and failures are investigated to derive lessons as to how to avoid them and improve efficiency in outsourcing. Topics discussed in this book combine theoretical and practical insights regarding challenges that both clients and vendors face. Case studies from client and vendor organizations are used extensively throughout the book. Last but not least, the book examines current and future trends in outsourcing and offshoring, placing particular attention on the centrality of innovation in sourcing arrangements, and how innovation can be realized in outsourcing. The book is based on a vast empirical base brought together through years of extensive research by leading researchers in information systems, strategic management and operations.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The traditional role of ports in the wider supply chain context is currently being subject to a process of radical review. In broad terms, the traditional model is being replaced by a model which focuses on higher value and more knowledge intensive activities. This trend requires a change in the way in which new knowledge and skills are developed by staff in companies of all kinds within port communities. Traditional models need to be re-evaluated to reflect the increasing importance of knowledge and skills acquisition, particularly in relation to the supply chain management (SCM) concept and the evolving role of information and communications technology (ICT) in improving supply chain capability. This paper describes the case of NITL’s Foundation Certificate Programme (FCP) learning programme with specific reference to its use in addressing some of current shortcomings related to supply chain knowledge and skills in port communities. The FCP rationale is based on the need to move from traditional approaches of supply chain organisation where the various links in the chain were measured and managed in isolation from each other and thus tended to operate at cross purposes, towards more cooperative and integrated approaches.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Recent years have seen innovations in the logistics and freight transport industry in relation to Information and communication technologies (ICT) diffusion. The implementation of such technologies by third party logistics providers (3PLs) allows the real-time exchange of information between supply chain partners, thereby improving planning capability and customer service. However, the logistics and freight transport industry is lagging somewhat behind other sectors in ICT diffusion. In relation to the latter point, it is important to note that the dissemination of ICT in logistics and supply chain management (SCM) is shifting the 3PL industry to an increasingly knowledge-intensive approach. In this process, the role of learning becomes more central and an assessment of the impact of future ICT learning needs for the logistics providers is a strategic imperative. The aim of this paper is to assess the impact of ICT on logistics and freight transport industry in Italy and Ireland, and to identify learning needs for more effective ICT adoption in 3PLs.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

We develop a multi-theoretic approach, drawing on economic, institutional, managerial power and social comparison literatures to explain the role of the external compensation consultant in the top management pay setting institutional field. Taking advantage of recent disclosure requirements in the UK, we collect data on compensation consultant use in 232 large companies. We show that consultants are a prevalent part of the CEO pay setting scene, and document evidence of all advisor use. Our econometric results show that consultant use is associated with firm size and the equity pay mix. We also show that CEO pay is positively associated with peer firms that share consultants, with higher board and consultant interlocks, and some evidence that where firms supply other business services to the firm, CEO pay is greater. © 2009 Springer Science+Business Media, LLC.

Relevância:

50.00% 50.00%

Publicador:

Resumo:

In England, publicly supported advice to small firms is organized primarily through the Business Link (BL) network. Using the programme theory underlying this business support, we develop four propositions and test these empirically using data from a new survey of over 3000 English SMEs. We find strong support for the value to BL operators of a high profile to boost take-up. We find support for the BL’s market segmentation that targets intensive assistance to younger firms and those with limited liability. Allowing for sample selection, we find no significant effects on growth from ‘other’ assistance but find a significant employment boost from intensive assistance. This partially supports the programme theory assertion that BL improves business growth and strongly supports the proposition that there are differential outcomes from intensive and other assistance. This suggests an improvement in the BL network, compared with earlier studies, notably Roper et al. (2001), Roper and Hart (2005).