3,536 research outputs found

    The Importance of Technology Trust for B2B Electronic Commerce

    Get PDF

    The Role of the Mangement Sciences in Research on Personalization

    Get PDF
    We present a review of research studies that deal with personalization. We synthesize current knowledge about these areas, and identify issues that we envision will be of interest to researchers working in the management sciences. We take an interdisciplinary approach that spans the areas of economics, marketing, information technology, and operations. We present an overarching framework for personalization that allows us to identify key players in the personalization process, as well as, the key stages of personalization. The framework enables us to examine the strategic role of personalization in the interactions between a firm and other key players in the firm's value system. We review extant literature in the strategic behavior of firms, and discuss opportunities for analytical and empirical research in this regard. Next, we examine how a firm can learn a customer's preferences, which is one of the key components of the personalization process. We use a utility-based approach to formalize such preference functions, and to understand how these preference functions could be learnt based on a customer's interactions with a firm. We identify well-established techniques in management sciences that can be gainfully employed in future research on personalization.CRM, Persoanlization, Marketing, e-commerce,

    The Impact of Customer Satisfaction and Loyalty on E-Marketing: Moderating Effect of Perceived Value

    Get PDF
    The paper discusses the various components that impacts customer satisfaction, loyalty, e-marketing and perceived value has the moderating effect. Online platforms continues been important because of the reach and the diversity of the customers meaning e-marketing should target the unique market. It includes developing products and services in addition to procedures and processes that reflect the wants of the customers. For example, the studies have shown the design of the website, customer engagement, and skills integrated into the entire processes are important. Factors such as security, ease of navigation, conflict resolution and effective feedback systems are example of frameworks that creates a positive reputation about a form, which increase the satisfaction of the users. Recommendations have also been provided for the ways and strategies that businesses have to operate to create customer loyalty and sustain such loyalty. The Impact of Customer Satisfaction and Loyalty on E-Marketing: Moderating Effect of Perceived Value In marketing regime, customer loyalty is seen as the most important issues that affect way business is conducted and performed. Managers and researchers have used many antecedents for explaining customer loyalty. The literature also provides numerous measures for evaluating loyalty (Jain et al. 2018; Momotaz & Hasan, 2018). The common perspective of loyalty and customer satisfaction is based on repurchase intention and customer commitment (Pandey & Chawla, 2018). Word of mouth and willingness to pay are defined as the direct variables that are consequences of loyalty (Pandey & Chawla, 2016; Jain et al. 2018). Loyal customers provide numerous advantages to an organization including recommendation to others, higher share of wallet, and higher customer retention rates. Customer satisfaction and perceived value are linked to companies’ financial performance, recommend intention, repurchase and retention. Researchers perceives marketing as a framework that embraces the conception of the value notion in that customer ways the benefits received from the firm the offers the products and services and the consumer is ready to acquire the product foregoing other benefits (Ahmad, Rahman & Khan, 2017; Momotaz & Hasan, 2018). The goal of any establishment is customer satisfaction, which creates numerous benefits to an establishment (Pandey & Chawla, 2016; Potdar et al. 2018). Satisfaction with brands, companies, products and services is important influencing post purchase response that is directly tired with consumer outcomes such as retention and loyalty. Companies continuously want to understand the behavior of their customers and have employed numbers measuring metrics. Example of these metrics includes Net Promoter Score and satisfaction (Khadim et al. 2018; Momotaz & Hasan, 2018). The customers through such mechanisms can be satisfied and can persuade others to acquire from a specific brand or company (Ahmad, Rahman & Khan, 2017; Jain et al. 2018). However, when customers value a competitor’s products and services, it means a company could continue loosing (Ting et al., 2016; Potdar et al. 2018). The integral component is the word of mouth communication in that information can be spread from one customer to the next (Fan, Kim & Lee, 2016). Some of the information shared includes services, products, brands and other information specific to a company or a brand. Managers continuously use the word of mouth strategic approach, which contributes to the likelihood of purchase, value ratings and changes in consumer judgments. Perceived value is the merits or worth that a customer ascribes to a service or product. In most instances, the customers are unaware of variables tied to a service or product such as pricing and the solution to the consumers is the emotional appeal of the product or service (Ahmad, Rahman & Khan, 2017; Momotaz & Hasan, 2018). Consumer’s perceived value refers to the price that a consumer is ready to pat for products or services (Pandey & Chawla, 2018; Potdar et al. 2018). Customers focus on the final outcome of the product or project such as the need to meet certain satisfaction is the role of marketers. Perceived utility is also important because it refers to the values and benefits consumer receives from the use of service and product. Consumers demand services and products that offer and are useful to the customer and unsatisfied customer may not have a positive view of the product and service (Khadim et al. 2018; Jain et al. 2018). Perceived value also communicates expectations about the service and products. Therefore, perceived value is the persuasion or consumer behavior to acquire a product or service and is satisfied with the pricing. The expectation of the consumers is fulfilling inherent needs and wants

    BUILDING TRUST FOR SERVICE ASSESSMENT IN INTERNET-ENABLED COLLABORATIVE PRODUCT DESIGN & REALIZATION ENVIRONMENTS

    Get PDF
    Reducing costs, increasing speed and leveraging the intelligence of partners involved during product design processes are important benefits of Internet-enabled collaborative product design and realization environments. The options for cost-effective product design, re-design or improvement are at their peak during the early stages of the design process and designers can collaborate with suppliers, manufacturers and other relevant contributors to acquire a better understanding of associated costs and product viability. Collaboration is by no means a new paradigm. However, companies have found distrust of collaborative partners to be the most intractable obstacle to collaborative commerce and Internet-enabled business especially in intellectual property environments, which handle propriety data on a constant basis. This problem is also reinforced in collaborative environments that are distributed in nature. Thus trust is the main driver or enabler of successful collaborative efforts or transactions in Internet-enabled product design environments. Focus is on analyzing the problem of ¡®trust for services¡¯ in distributed collaborative service provider assessment and selection, concentrating on characteristics specific to electronic product design (e-Design) environments. Current tools for such collaborative partner/provider assessment are inadequate or non-existent and researching network, user, communication and service trust problems, which hinder the growth and acceptance of true collaboration in product design, can foster new frontiers in manufacturing, business and technology. Trust and its associated issues within the context of a secure Internet-enabled product design & realization platform is a multifaceted and complex problem, which demands a strategic approach crossing disciplinary boundaries. A Design Environment Trust Service (DETS) framework is proposed to incorporate trust for services in product design environments based on client specified (or default) criteria. This involves the analysis of validated network (objective) data and non-network (subjective) data and the use of Multi Criteria Decision Making (MCDM) methodology for the selection of the most efficient service provision alternative through the minimization of distance from a specified ideal point and interpreted as a Dynamic (Design) Trust Index (DTI) or rank. Hence, the service requestor is provided with a quantifiable degree of belief to mitigate information asymmetry and enable knowledgeable decision-making regarding trustworthy service provision in a distributed environment

    ROVER: a DNS-based method to detect and prevent IP hijacks

    Get PDF
    2013 Fall.Includes bibliographical references.The Border Gateway Protocol (BGP) is critical to the global internet infrastructure. Unfortunately BGP routing was designed with limited regard for security. As a result, IP route hijacking has been observed for more than 16 years. Well known incidents include a 2008 hijack of YouTube, loss of connectivity for Australia in February 2012, and an event that partially crippled Google in November 2012. Concern has been escalating as critical national infrastructure is reliant on a secure foundation for the Internet. Disruptions to military, banking, utilities, industry, and commerce can be catastrophic. In this dissertation we propose ROVER (Route Origin VERification System), a novel and practical solution for detecting and preventing origin and sub-prefix hijacks. ROVER exploits the reverse DNS for storing route origin data and provides a fail-safe, best effort approach to authentication. This approach can be used with a variety of operational models including fully dynamic in-line BGP filtering, periodically updated authenticated route filters, and real-time notifications for network operators. Our thesis is that ROVER systems can be deployed by a small number of institutions in an incremental fashion and still effectively thwart origin and sub-prefix IP hijacking despite non-participation by the majority of Autonomous System owners. We then present research results supporting this statement. We evaluate the effectiveness of ROVER using simulations on an Internet scale topology as well as with tests on real operational systems. Analyses include a study of IP hijack propagation patterns, effectiveness of various deployment models, critical mass requirements, and an examination of ROVER resilience and scalability

    An Analysis of the Design-Build Delivery Method in Air Force Military Construction

    Get PDF
    The design-build method for construction project delivery continues to grow in both the private and public sector. Several government agencies have observed, through experience with design-build, positive results which give “anecdotal” credibility to design-build methods. The objective of this study is to compare the performance of the design-build delivery method with traditional design-bid-build approaches for Air Force (AF) military construction (MILCON). Data related to 835 (278 design-build, 557 traditional) MILCON projects were gathered from the Automated Civil Engineer System – Project Management Module (ACES-PM) for Fiscal Years 1996-2006. The design-build method had better performance for six of eight metrics with highly significant results for cost growth and number of modifications per million dollars. The traditional method experienced a highly significant advantage for the metrics of construction timeline and total project time. The historical analysis revealed that design-build MILCON has improved significantly for cost growth, modifications per million dollars, construction timeline, and total project time. The traditional method also improved for the cost growth and modifications per million dollars metrics. Finally, the facility type analysis revealed that the design-build method was best suited for seven of the nine facility types. This study provides empirical evidence of where the design-build delivery method provides an advantage to the traditional method for AF MILCON execution

    Data analytics 2016: proceedings of the fifth international conference on data analytics

    Get PDF
    • …
    corecore