128,255 research outputs found

    Mobile Communications Industry Scenarios and Strategic Implications for Network Equipment Vendors

    Get PDF
    Mobile infrastructure markets have changed dramatically during the past years. The industry is experiencing a shift from traditional large-scale, hardware-driven system roll-outs to software and services -driven business models. Also, the telecommunications and internet worlds are colliding in both mobile infrastructure and services domains requiring established network equipment vendors and mobile operators to transform and adapt to the new business environment. This paper utilizes Schoemaker's scenario planning process to reveal critical uncertain elements shaping the future of the industry. Four possible scenarios representing different value systems between industry's key stakeholders are created. After this, five strategic options with differing risk and cost factors for established network equipment vendors are discussed in order to aid firm's strategic planning process. --

    Sales Promotion and Consumer Loyalty: A Study of Nigerian Tecommunication Industry

    Get PDF
    In today’s competitive business world customers are considered to be kings. Customers have several choices to make among alternative products, and they exercise a high level of influence in the market with respect to product size, quality and price. Hence, it is important for producers to meet the needs of customers in order to stay competitive. One of the marketing communication tools that is used in attracting the attention of the customer and build their loyalty is sales promotion. The aim of this paper therefore is to determine the effect of sales promotion on customer loyalty in the telecommunication industry. In this study, the survey method was used in gathering information from the respondents. Simple random sampling was used to select a sample size of 310, while descriptive and inferential statistical analyses were conducted with the aid of SPSS software. Producers spend a large part of their total marketing communication expenses on sales promotion. Hence, this paper attempts to find the effect of sales promotion on customer loyalty using a sample of customers of mobile telecommunication services. The paper found that, there is positive relationship between sales promotion and customer loyalty. More importantly, it was discovered that non-loyal customers are more prone to switch to competing products as a result of sales promotion than loyal customer

    Security in transnational interoperable PPDR communications: threats and requirements

    Get PDF
    The relevance of cross border security operations has been identified as a priority at European level for a long time. A European network where Public Protection and Disaster Relief (PPDR) forces share communications processes and a legal framework would greatly enforce response to disaster recovery and security against crime. Nevertheless, uncertainty on costs, timescale and functionalities have slowed down the interconnection of PPDR networks across countries and limited the transnational cooperation of their PPDR forces so far. In this context, the European research project ISITEP is aimed at developing the legal, operational and technical framework to achieve a cost effective solution for PPDR interoperability across European countries. Inter alia, ISITEP project is specifying a new Inter-System-Interface (ISI) interface for the interconnection of current TETRA and TETRAPOL networks that can be deployed over Internet Protocol (IP) connectivity. This approach turns communications security as a central aspect to consider when deploying the new IP ISI protocol between PPDR national networks. Ensuring that threats to the interconnected communications systems and terminals are sufficiently and appropriately reduced by technical, procedural and environmental countermeasures is vital to realise the trusted and secure communication system needed for the pursued PPDR transnational cooperation activities. In this context, this paper describes the framework and methodology defined to carry out the development of the security requirements and provides a discussion on the undertaken security risk and vulnerability analysis.Peer ReviewedPostprint (author's final draft
    • 

    corecore