8,066 research outputs found

    Interorganizational Networks : the Issue of Global Sovereignty

    Get PDF
    One of the most striking phenomena of the past decade has been the internationalisation of service firms (Tersen and Bricout, 1996). Previously considered “un-exportable” (Segal-Horn, 1993), they have proven day after day that they have the necessary characteristics to undertake an international development, and even a globalization of their offering systems (Vandermerwe, 1989 ; Campbell and Verbeke, 1994 ; Gadrey, 1994 ;). Retail banking and financial services are remarkable illustrations of this phenomenon (Michalet, 1985 ; Andreff, 1995). And bank cards in the first place. However, management scholars have been slow in reacting to this challenge. Focused on industry (and surprisingly enough on the automotive industry), the scholars have rather neglected the emerging field of international service firms. This Research gap has motivated our project on the international deployment of services. The field study we have selected is relative to the bank card organizations. This industry illustrates the functioning of service firms as political institutions. A striking example relates to the emergence and development of international standards bodies, specifically in the area of Internet payments. We are faced here with the construction of a transnational regulation. This paper brings twofold a contribution. On one hand, it enriches the interpretation of a very important, peculiar and potentially generic research object, through the lenses of the translation theory. On the other hand, it has key managerial implications regarding « political » strategies with regard to positioning as a regulatory institution. Discussion follows on the consequences of these agencies' activities for business enterprises.

    Teensites.com: A Field Guide to the New Digital Landscape

    Get PDF
    A 2001 report from the Center for Media Education, provided here as background to work produced by Kathryn Montgomery after coming to American University and CSM (see http://www.centerforsocialmedia.org/resources/publications/ecitizens/index2.htm -- Youth as E-Citizens'), surveys the burgeoning digital media culture directed at -- and in some cases created by -- teens.This report surveys the burgeoning new media culture directed at -- and in some cases created by -- teens. TeenSites.com -- A Field Guide to the New Digital Landscape examines the uniquely interactive nature of the new media, and explores the ways in which teens are at once shaping and being shaped by the electronic culture that surrounds them

    Cyberspace As/And Space

    Get PDF
    The appropriate role of place- and space-based metaphors for the Internet and its constituent nodes and networks is hotly contested. This essay seeks to provoke critical reflection on the implications of place- and space-based theories of cyberspace for the ongoing production of networked space more generally. It argues, first, that adherents of the cyberspace metaphor have been insufficiently sensitive to the ways in which theories of cyberspace as space themselves function as acts of social construction. Specifically, the leading theories all have deployed the metaphoric construct of cyberspace to situate cyberspace, explicitly or implicitly, as separate space. This denies all of the ways in which cyberspace operates as both extension and evolution of everyday spatial practice. Next, it argues that critics of the cyberspace metaphor have confused two senses of space and two senses of metaphor. The cyberspace metaphor does not refer to abstract, Cartesian space, but instead expresses an experienced spatiality mediated by embodied human cognition. Cyberspace in this sense is relative, mutable, and constituted via the interactions among practice, conceptualization, and representation. The insights drawn from this exercise suggest a very different way of understanding both the spatiality of cyberspace and its architectural and regulatory challenges. In particular, they suggest closer attention to three ongoing shifts: the emergence of a new sense of social space, which the author calls networked space; the interpenetration of embodied, formerly bounded space by networked space; and the ways in which these developments alter, instantiate, and disrupt geographies of power

    Pervasive Computing: Embedding the Public Sphere

    Full text link

    Keynote address: the networked bank

    Get PDF
    Technology ; Banks and banking - Customer services ; Automated tellers

    Bridging the Gap: Exploring new ways to deliver online Grocery shopping using Smart Software

    Get PDF
    Its great convenience and the availability of delivery and pickup options, online grocery shopping has transformed the procurement of food and household goods. These platforms frequently outperform brick-and-mortar businesses in terms of product selection. Technology, such as mobile apps and websites, has played a critical role in this process by delivering user-friendly interfaces, personalized recommendations, and smooth transactions. Artificial intelligence and data analytics improve the shopping experience even further by personalizing options and streamlining inventory management for shops.However, there are significant hurdles to online grocery buying, including delivery problems, the need for strong cybersecurity, and worries about the environmental impact of packing and transportation. Despite these obstacles, the online grocery business continues to be a dynamic and exciting component of modern retail as technology evolves and customer behaviors change

    Electronic Commerce in Agriculture and Agribusiness: the Case of Emilia-Romagna (Italy)

    Get PDF
    Despite the expectations of the benefits of this tool, the adoption of Electronic Commerce(EC) by small and medium firms of the agro-food sector in Italy is still not frequent, however, the understanding of opportunities it could create and how they can be exploited remains a relevant issue. This study, carried out in the Emilia -Romagna region during 2002, illustrates the results of a survey of 208 firms at all stages of the agro-food chain aimed at understanding the use of the Internet and the strategies adopted for EC implementation. The results show a low level of implementation of the instrument and a limited variety of adoption strategies. Agro-food firms actually invest very little in EC focusing their efforts on the Internet as promotion tool, while web-based direct selling is confined to market niches. The view that the Internet would reverse the disadvantages of small firms appears by now non realistic, even if interesting opportunities for further development are still present.E-commerce, agribusiness, Emilia-Romagna (Italy)

    Privacy, Ideology, and Technology: A Response to Jeffrey Rosen

    Get PDF
    This essay reviews Jeffrey Rosen’s The Unwanted Gaze: The Destruction of Privacy in America (2000). Rosen offers a compelling (and often hair-raising) account of the pervasive dissolution of the boundary between public and private information. This dissolution is both legal and social; neither the law nor any other social institution seems to recognize many limits on the sorts of information that can be subjected to public scrutiny. The book also provides a rich, evocative characterization of the dignitary harms caused by privacy invasion. Rosen’s description of the sheer unfairness of being “judged out of context” rings instantly true. Privacy, Rosen concludes, is indispensable to human well-being and is at risk of being destroyed unless we act fast. The book is far less convincing, however, when it moves beyond description and attempts to identify the causes of the destruction of privacy and propose solutions. Why is privacy under siege today? The incidents that Rosen chooses as illustrations both reveal and obscure. From Monica Lewinsky’s unsent, deleted e-mails to the private online activities of corporate employees and the Dean of the Harvard Divinity School, the examples offer a rich stew of technology, corporate mind control, public scapegoating, and political intrigue. But for the most part, Rosen seems to think that it is sex that is primarily to blame for these developments—though how, exactly, Rosen cannot seem to decide. He suggests, variously, that we seek private information out of prurient fascination with other people’s intimate behavior, or to enforce upon others authoritarian notions of “correct” interpersonal behavior, or to inform moral judgments about others based on a hasty and ill-conceived equivalence between the personal and the political. Or perhaps Rosen is simply upset about the loss of privacy for a specific sort of (sexual or intimate) behavior, whatever the origin of society’s impulse to pry. Yet there are puzzling anomalies in Rosen’s account. Most notably, appended to Rosen’s excavation of recent sex-related privacy invasions is a chapter on privacy in cyberspace. This chapter sits uneasily in relation to the rest of the book. Its focus is not confined to sex-related privacy, and Rosen does not explain how the more varied information-gathering activities chronicled there bear on his earlier analysis. Rosen acknowledges as much and offers, instead, the explanation that intimate privacy and cyberspace privacy are simply two examples of the same problem: the risk of being judged out of context in a world of short attention spans, and the harms to dignity that follow. This explanation seems far too simple, and more than a bit circular. Why this rush to judge others out of context? Necessity is one answer—if attention spans are limited, we cannot avoid making decisions based on incomplete information—but where does the necessity to judge come from? And what do computers and digital networking technologies—factors that recur not only in the chapter on cyberspace privacy, but also in most of Rosen’s other examples—have to do with it? This Review Essay argues, first, that the use of personal information to sort and classify individuals is inextricably bound up with the fabric of our political economy. As Part II explains, the unfettered use of “true” information to predict risk and minimize uncertainty is a hallmark of the liberal state and its constituent economic and political markets. Not sex, but money, and more broadly an ideology about the predictive power of isolated facts, generate the perceived necessity to judge individuals based on incomplete profiles. The harms of this rush to judgment—harms not only to dignity, but also to economic welfare and more fundamentally to individual autonomy—may undermine liberal individualism (as Rosen argues), but they are products of it as well. Part III argues, further, that the problem of vanishing informational privacy in digital networked environments is not sui generis, but rather is central to understanding the destruction of privacy more generally. This is not simply because new technologies reduce the costs of collecting, exchanging, and processing the traditional sorts of consumer information. The profit-driven search for personal information via digital networks is also catalyzing an erosion of the privacy that individuals have customarily enjoyed in their homes, their private papers, and even their thoughts. This process is transforming not only the way we experience privacy, but also the way we understand it. Privacy is becoming not only harder to protect, but also harder to justify protecting. Part IV concludes that shifting these mutually reinforcing ideological and technological vectors will require more drastic intervention than Rosen suggests
    • 

    corecore