11,673 research outputs found

    Human Resource and Employment Practices in Telecommunications Services, 1980-1998

    Get PDF
    [Excerpt] In the academic literature on manufacturing, much research and debate have focused on whether firms are adopting some form of “high-performance” or “high-involvement” work organization based on such practices as employee participation, teams, and increased discretion, skills, and training for frontline workers (Ichniowski et al., 1996; Kochan and Osterman, 1994; MacDuffie, 1995). Whereas many firms in the telecommunications industry flirted with these ideas in the 1980s, they did not prove to be a lasting source of inspiration for the redesign of work and employment practices. Rather, work restructuring in telecommunications services has been driven by the ability of firms to leverage network and information technologies to reduce labor costs and create customer segmentation strategies. “Good jobs” versus “bad jobs,” or higher versus lower wage jobs, do not vary according to whether firms adopt a high- involvement model. They vary along two other dimensions: (1) within firms and occupations, by the value-added of the customer segment that an employee group serves; and (2) across firms, by union and nonunion status. We believe that this customer segmentation strategy is becoming a more general model for employment practices in large-scale service | operations; telecommunications services firms may be somewhat more | advanced than other service firms in adopting this strategy because of certain unique industry characteristics. The scale economies of network technology are such that once a company builds the network infrastructure to a customer’s specifications, the cost of additional services is essentially zero. As a result, and notwithstanding technological uncertainty, all of the industry’s major players are attempting to take advantage of system economies inherent in the nature of the product market and technology to provide customized packages of multimedia products to identified market segments. They have organized into market-driven business units providing differentiated services to large businesses and institutions, small businesses, and residential customers. They have used information technologies and process reengineering to customize specific services to different segments according to customer needs and ability to pay. Variation in work and employment practices, or labor market segmentation, follows product market segmentation. As a result, much of the variation in employment practices in this industry is within firms and within occupations according to market segment rather than across firms. In addition, despite market deregulation beginning in 1984 and opportunities for new entrants, a tightly led oligopoly structure is replacing the regulated Bell System monopoly. Former Bell System companies, the giants of the regulated period, continue to dominate market share in the post-1984 period. Older players and new entrants alike are merging and consolidating in order to have access to multimedia markets. What is striking in this industry, therefore, is the relative lack of variation in management and employment practices across firms after more than a decade of experience with deregulation. We attribute this lack of variation to three major sources. (1) Technological advances and network economics provide incentives for mergers, organizational consolidation, and, as indicated above, similar business strategies. (2) The former Bell System companies have deep institutional ties, and they continue to benchmark against and imitate each other so that ideas about restructuring have diffused quickly among them. (3) Despite overall deunionization in the industry, they continue to have high unionization rates; de facto pattern bargaining within the Bell system has remained quite strong. Therefore, similar employment practices based on inherited collective bargaining agreements continue to exist across former Bell System firms

    Critical Management Issues for Implementing RFID in Supply Chain Management

    Get PDF
    The benefits of radio frequency identification (RFID) technology in the supply chain are fairly compelling. It has the potential to revolutionise the efficiency, accuracy and security of the supply chain with significant impact on overall profitability. A number of companies are actively involved in testing and adopting this technology. It is estimated that the market for RFID products and services will increase significantly in the next few years. Despite this trend, there are major impediments to RFID adoption in supply chain. While RFID systems have been around for several decades, the technology for supply chain management is still emerging. We describe many of the challenges, setbacks and barriers facing RFID implementations in supply chains, discuss the critical issues for management and offer some suggestions. In the process, we take an in-depth look at cost, technology, standards, privacy and security and business process reengineering related issues surrounding RFID technology in supply chains

    CHANGE – E-BUSINESS – THE MAJOR FACTORS FOR ADVANCED COMPETITIVE IN ROMANIAN TRAVEL AGENCIES

    Get PDF
    The Internet and e-business adoption are the most important issues of this century for travel agencies. Although, the Internet provides many opportunities to do business; therefore, in the near future the Romania travel agencies may lose their competitiveness. Redesigning the business processes of travel agencies to adapt them to e-business environment is aimed in this study. The present system is going to be analyzed and redesigned to make them able to utilize from technology efficiently.e-business, travel agencies, e-commerce

    Privacy-Preserving Reengineering of Model-View-Controller Application Architectures Using Linked Data

    Get PDF
    When a legacy system’s software architecture cannot be redesigned, implementing additional privacy requirements is often complex, unreliable and costly to maintain. This paper presents a privacy-by-design approach to reengineer web applications as linked data-enabled and implement access control and privacy preservation properties. The method is based on the knowledge of the application architecture, which for the Web of data is commonly designed on the basis of a model-view-controller pattern. Whereas wrapping techniques commonly used to link data of web applications duplicate the security source code, the new approach allows for the controlled disclosure of an application’s data, while preserving non-functional properties such as privacy preservation. The solution has been implemented and compared with existing linked data frameworks in terms of reliability, maintainability and complexity

    Paradigms of the factors that impinge upon business-to-business e-commerce evolution

    Get PDF

    Suitability of Mobile Communication Techniques for the Business Processes of Intervention Forces

    Get PDF
    Intervention forces are special, often state-run organizations that are in charge of surveillance and intervention tasks. Examples are police, medical emergency services, civil defense, and security firms. From a business processes view, intervention forces are a subset of organizations whose operational business is mobile. The contribution analyzes the potentials and limits of mobile business processes for intervention forces. It proposes first approaches in the direction of a fully-integrated process chain for these organizations with regard to the special rules of mobile business.

    Issues with implementing ERP in the public administration

    Get PDF
    As governments work to transform their environments from an internal resource optimization to a process integration and external collaboration focus, integrated systems stand at the forefront of solutions that will achieve this goal. Enterprise Resource Planning (ERP) is proven to significantly increase efficiency, improve information access, reduce total cost of ownership, and help government achieve the highest levels of accountability and constituent service. Yet implementing ERP in a manner that achieves its promises is no easy task. Public sector organizations often rationalize their ERP modernization initiatives within the context of budgetary constraints and are faced with multiple ERP providers that, on the surface, are difficult to discern. In addition, adjudicating between competing ERP solutions on their functional merit is not only difficult because of the complexity of ERP systems, but it is further complicated by the intricacy of the government acquisition process. Therefore, it is particularly important that the business value be sold at the executive and political levels of government and, to be successful, that government embeds the ERP solution within its culture and processes. What's more, the level of detailed analysis required to map functional requirements to ERP solutions is an arduous task that, even if done thoroughly, hasn't always delivered a successful implementation. In this article, we will address these issues by examining the evolution and shortcomings of ERP solutions; by defining the features and functionality needed to address government transformation; and by recommending the steps to take to position for success.government, public organizations, ERP, integrated systems
    • 

    corecore