46,767 research outputs found

    SMEs, electronically-mediated working and data security: cause for concern?

    Get PDF
    Security of data is critical to the operations of firms. Without the ability to store, process and transmit data securely, operations may be compromised, with the potential for serious consequences to trading integrity. Thus the role that electronically-mediated working plays in business today and its dependency on data security is of critical interest, especially in light of the fact that much of this communication is based on the use of open networks (i.e. the Internet). This paper discusses findings from a 'WestFocus' survey on electronically-mediated working and telework amongst a sample of SMEs located in West London and adjacent counties in South-Eastern England in order to highlight the problems that such practice raises in terms of data security. Data collection involved a telephone survey undertaken in early 2006 of 378 firms classified into four industrial sectors ('Media', 'Logistics', 'Internet Services' and 'Food Processing'). After establishing how ICTs and the Internet are being exploited as business applications for small firms, data security practice is explored on the basis of sector and size with a focus on telework. The paper goes on to highlight areas of concern in terms of data security policy and training practice. Findings show some sector and size influences.WestFocus* under the Higher Education Innovation Fund (HEIF 2

    Profiling research published in the journal of enterprise information management (JEIM)

    Get PDF
    Purpose – The purpose of this paper is to analyse research published in the Journal of Enterprise Information Management (JEIM) in the last ten years (1999 to 2008). Design/methodology/approach – Employing a profiling approach, the analysis of the 381 JEIM publications includes examining variables such as the most active authors, geographic diversity, authors' backgrounds, co-author analysis, research methods and keyword analysis. Findings – All the finding are in relation to the period of analysis (1999 to 2008). (a) Research categorised under descriptive, theoretical and conceptual methods is the most dominant research approach followed by JEIM authors. This is followed by case study research. (b) The largest proportion of contributions came from researchers and practitioners with an information systems background, followed by those with a background in business and computer science and IT. (c) The keyword analysis suggests that ‘information systems’, ‘electronic commerce’, ‘internet’, ‘logistics’, ‘supply chain management’, ‘decision making’, ‘small to medium-sized enterprises’, ‘information management’, ‘outsourcing’, and ‘modelling’ were the most frequently investigated keywords. (d) The paper presents and discusses the findings obtained from the citation analysis that determines the impact of the research published in the JEIM. Originality/value – The primary value of this paper lies in extending the understanding of the evolution and patterns of IS research. This has been achieved by analysing and synthesising existing JEIM publications

    The significance of logistics in servicing growing volumes of e-commerce

    Get PDF
    Purpose: The article highlights the multi-task nature and prospects of the development of the transit potential of warehouse logistics systems, reveals the theoretical and methodological foundations of logistics in the storage and cargo handling system, indicates and confirms the importance of warehousing logistics in the context of servicing the growing volumes of electronic commerce. Design/Methodology/Approach: For the purposes of developing logistics in the storage and cargo handling system we study the technical and technological support and design developments that have significant potential for increasing the efficiency of logistics processes, and to study consumer behavior in the warehouse services market and transport market trends - warehouse activities. Findings: Automation significantly simplifies logistics processes, information exchange, remote control and management, optimizes costs by combining various market entities and objects, target groups and parameters of logistics processes on electronic platforms. Integration in modern logistics allows synchronizing the complex information component of electronic services and platforms and activating the formation of a system interface that is common for all elements of the logistics system of warehousing, cargo processing and inventory management. Practical implications: The results of the study can be implemented in the activities of Russian companies in order to develop the transit potential of warehouse logistics systems. Originality/value: The significance of this study lies in shifting the emphasis to the need to switch to improved customer service systems taking into account the needs and development of online retail and fulfillment of logistics operators (full-cycle operator: taking goods from the customer’s warehouse, responsible storage, packaging, delivery, work with returns), tied to the development of infrastructure, as the foundation for increasing the efficiency, speed and quality of logistics processes.peer-reviewe

    Integrating a web-based system with business processes in closed loop supply chains

    Get PDF
    Closed Loop Supply Chains include operations for physical collection of end-of-use products, selection based on their configuration and/or condition and decision making for reuse, remanufacturing or recycling. Uncertainty factors regarding the time, place of origin, and status of returns introduce many difficulties in planning these operations. With the aim to minimize such problems, this paper presents an architecture for virtual reverse logistics networks and an implementation for end-of-use PCs. The virtual reverse logistics network for PCs relies on E-commerce and WWW technologies for remote monitoring and benchmarking, instead of physical transportation and inspection. A configuration monitoring and benchmarking agent screens the computer that is about to enter the end-of-use stream and registers the data in the system’s databases. The virtual reverse logistics network regards all incoming PCs as submitted offers. Also, users or agents may explicitly register requests for PCs or modules. Offers are matched to requests with a decision support system to provide recommendations for reuse, remanufacturing or recycling of end-of-use PCs. An electronic marketplace matches requests and offers. The proposed architecture diminishes the uncertainty factors and provides us with an understanding on what is missing and it is likely to have a positive impact to the development of virtual reverse logistics networks for computers and other equipment with embedded logic.business processes;Closed Loop Supply Chains;virtual reverse logistics networks;web-based system

    Critical review of the e-loyalty literature: a purchase-centred framework

    Get PDF
    Over the last few years, the concept of online loyalty has been examined extensively in the literature, and it remains a topic of constant inquiry for both academics and marketing managers. The tremendous development of the Internet for both marketing and e-commerce settings, in conjunction with the growing desire of consumers to purchase online, has promoted two main outcomes: (a) increasing numbers of Business-to-Customer companies running businesses online and (b) the development of a variety of different e-loyalty research models. However, current research lacks a systematic review of the literature that provides a general conceptual framework on e-loyalty, which would help managers to understand their customers better, to take advantage of industry-related factors, and to improve their service quality. The present study is an attempt to critically synthesize results from multiple empirical studies on e-loyalty. Our findings illustrate that 62 instruments for measuring e-loyalty are currently in use, influenced predominantly by Zeithaml et al. (J Marketing. 1996;60(2):31-46) and Oliver (1997; Satisfaction: a behavioral perspective on the consumer. New York: McGraw Hill). Additionally, we propose a new general conceptual framework, which leads to antecedents dividing e-loyalty on the basis of the action of purchase into pre-purchase, during-purchase and after-purchase factors. To conclude, a number of managerial implementations are suggested in order to help marketing managers increase their customers’ e-loyalty by making crucial changes in each purchase stage
    corecore