11,673 research outputs found
Human Resource and Employment Practices in Telecommunications Services, 1980-1998
[Excerpt] In the academic literature on manufacturing, much research and debate have focused on whether firms are adopting some form of âhigh-performanceâ or âhigh-involvementâ work organization based on such practices as employee participation, teams, and increased discretion, skills, and training for frontline workers (Ichniowski et al., 1996; Kochan and Osterman, 1994; MacDuffie, 1995). Whereas many firms in the telecommunications industry flirted with these ideas in the 1980s, they did not prove to be a lasting source of inspiration for the redesign of work and employment practices. Rather, work restructuring in telecommunications services has been driven by the ability of firms to leverage network and information technologies to reduce labor costs and create customer segmentation strategies. âGood jobsâ versus âbad jobs,â or higher versus lower wage jobs, do not vary according to whether firms adopt a high- involvement model. They vary along two other dimensions: (1) within firms and occupations, by the value-added of the customer segment that an employee group serves; and (2) across firms, by union and nonunion status.
We believe that this customer segmentation strategy is becoming a more general model for employment practices in large-scale service | operations; telecommunications services firms may be somewhat more | advanced than other service firms in adopting this strategy because of certain unique industry characteristics. The scale economies of network technology are such that once a company builds the network infrastructure to a customerâs specifications, the cost of additional services is essentially zero. As a result, and notwithstanding technological uncertainty, all of the industryâs major players are attempting to take advantage of system economies inherent in the nature of the product market and technology to provide customized packages of multimedia products to identified market segments. They have organized into market-driven business units providing differentiated services to large businesses and institutions, small businesses, and residential customers. They have used information technologies and process reengineering to customize specific services to different segments according to customer needs and ability to pay. Variation in work and employment practices, or labor market segmentation, follows product market segmentation. As a result, much of the variation in employment practices in this industry is within firms and within occupations according to market segment rather than across firms.
In addition, despite market deregulation beginning in 1984 and opportunities for new entrants, a tightly led oligopoly structure is replacing the regulated Bell System monopoly. Former Bell System companies, the giants of the regulated period, continue to dominate market share in the post-1984 period. Older players and new entrants alike are merging and consolidating in order to have access to multimedia markets. What is striking in this industry, therefore, is the relative lack of variation in management and employment practices across firms after more than a decade of experience with deregulation. We attribute this lack of variation to three major sources. (1) Technological advances and network economics provide incentives for mergers, organizational consolidation, and, as indicated above, similar business strategies. (2) The former Bell System companies have deep institutional ties, and they continue to benchmark against and imitate each other so that ideas about restructuring have diffused quickly among them. (3) Despite overall deunionization in the industry, they continue to have high unionization rates; de facto pattern bargaining within the Bell system has remained quite strong. Therefore, similar employment practices based on inherited collective bargaining agreements continue to exist across former Bell System firms
Critical Management Issues for Implementing RFID in Supply Chain Management
The benefits of radio frequency identification (RFID) technology in the supply chain are fairly compelling. It has the potential to revolutionise the efficiency, accuracy and security of the supply chain with significant impact on overall profitability. A number of companies are actively involved in testing and adopting this technology. It is estimated that the market for RFID products and services will increase significantly in the next few years. Despite this trend, there are major impediments to RFID adoption in supply chain. While RFID systems have been around for several decades, the technology for supply chain management is still emerging. We describe many of the challenges, setbacks and barriers facing RFID implementations in supply chains, discuss the critical issues for management and offer some suggestions. In the process, we take an in-depth look at cost, technology, standards, privacy and security and business process reengineering related issues surrounding RFID technology in supply chains
CHANGE â E-BUSINESS â THE MAJOR FACTORS FOR ADVANCED COMPETITIVE IN ROMANIAN TRAVEL AGENCIES
The Internet and e-business adoption are the most important issues of this century for travel agencies. Although, the Internet provides many opportunities to do business; therefore, in the near future the Romania travel agencies may lose their competitiveness. Redesigning the business processes of travel agencies to adapt them to e-business environment is aimed in this study. The present system is going to be analyzed and redesigned to make them able to utilize from technology efficiently.e-business, travel agencies, e-commerce
Recommended from our members
E-government: A comparison of strategies in local authorities in the UK and Norway
In Europe almost all countries have implemented some form of e-government, not to mention the UK and Norway which are now both well into their sixth year of e-government implementation. These six years have seen various strategic plans formulated, implemented and also intermittently postponed in the two countries. Although time may result in the amplification of e-government experience for Norway and the UK, the postponement of implementation deadlines indicates that not only political and social issues, but also strategic and organisational issues need to be addressed when formulating plans for deploying e-government. Using empirical research this paper examines the strategies adopted by the UK and Norway in the context of aligning central and local government plans for implementing e-government services. While technical, political and social issues are considered as key areas to be addressed in any e-government exploitation plan; this paper examines how different perspectives on e-government definition, strategy, awareness and related organisational change influence implementation. The need to align central and local e-government plans, guidelines for local level implementation, user centred solutions, strong leadership and a common understanding of the definition of e-government are highlighted in the paper as some of the key components of good e-government implementation practice
Privacy-Preserving Reengineering of Model-View-Controller Application Architectures Using Linked Data
When a legacy systemâs software architecture cannot be redesigned, implementing
additional privacy requirements is often complex, unreliable and
costly to maintain. This paper presents a privacy-by-design approach to
reengineer web applications as linked data-enabled and implement access
control and privacy preservation properties. The method is based on the
knowledge of the application architecture, which for the Web of data is
commonly designed on the basis of a model-view-controller pattern. Whereas
wrapping techniques commonly used to link data of web applications duplicate
the security source code, the new approach allows for the controlled
disclosure of an applicationâs data, while preserving non-functional properties
such as privacy preservation. The solution has been implemented
and compared with existing linked data frameworks in terms of reliability,
maintainability and complexity
Suitability of Mobile Communication Techniques for the Business Processes of Intervention Forces
Intervention forces are special, often state-run organizations that are in charge of surveillance and intervention tasks. Examples are police, medical emergency services, civil defense, and security firms. From a business processes view, intervention forces are a subset of organizations whose operational business is mobile. The contribution analyzes the potentials and limits of mobile business processes for intervention forces. It proposes first approaches in the direction of a fully-integrated process chain for these organizations with regard to the special rules of mobile business.
Issues with implementing ERP in the public administration
As governments work to transform their environments from an internal resource optimization to a process integration and external collaboration focus, integrated systems stand at the forefront of solutions that will achieve this goal. Enterprise Resource Planning (ERP) is proven to significantly increase efficiency, improve information access, reduce total cost of ownership, and help government achieve the highest levels of accountability and constituent service. Yet implementing ERP in a manner that achieves its promises is no easy task. Public sector organizations often rationalize their ERP modernization initiatives within the context of budgetary constraints and are faced with multiple ERP providers that, on the surface, are difficult to discern. In addition, adjudicating between competing ERP solutions on their functional merit is not only difficult because of the complexity of ERP systems, but it is further complicated by the intricacy of the government acquisition process. Therefore, it is particularly important that the business value be sold at the executive and political levels of government and, to be successful, that government embeds the ERP solution within its culture and processes. What's more, the level of detailed analysis required to map functional requirements to ERP solutions is an arduous task that, even if done thoroughly, hasn't always delivered a successful implementation. In this article, we will address these issues by examining the evolution and shortcomings of ERP solutions; by defining the features and functionality needed to address government transformation; and by recommending the steps to take to position for success.government, public organizations, ERP, integrated systems
- âŠ