128,255 research outputs found
Mobile Communications Industry Scenarios and Strategic Implications for Network Equipment Vendors
Mobile infrastructure markets have changed dramatically during the past years. The industry is experiencing a shift from traditional large-scale, hardware-driven system roll-outs to software and services -driven business models. Also, the telecommunications and internet worlds are colliding in both mobile infrastructure and services domains requiring established network equipment vendors and mobile operators to transform and adapt to the new business environment. This paper utilizes Schoemaker's scenario planning process to reveal critical uncertain elements shaping the future of the industry. Four possible scenarios representing different value systems between industry's key stakeholders are created. After this, five strategic options with differing risk and cost factors for established network equipment vendors are discussed in order to aid firm's strategic planning process. --
Sales Promotion and Consumer Loyalty: A Study of Nigerian Tecommunication Industry
In todayâs competitive business world customers are considered to be kings. Customers have several choices to make among alternative products, and they exercise a high level of influence in the market with respect to product size, quality and price. Hence, it is important for
producers to meet the needs of customers in order to stay competitive. One of the marketing communication tools that is used in attracting the attention of the customer and build their loyalty is sales promotion. The aim of this paper therefore is to determine the effect of sales
promotion on customer loyalty in the telecommunication industry. In this study, the survey method was used in gathering information from the respondents. Simple random sampling was used to select a sample size of 310, while descriptive and inferential statistical analyses were
conducted with the aid of SPSS software. Producers spend a large part of their total marketing communication expenses on sales promotion. Hence, this paper attempts to find the effect of sales promotion on customer loyalty using a sample of customers of mobile telecommunication
services. The paper found that, there is positive relationship between sales promotion and customer loyalty. More importantly, it was discovered that non-loyal customers are more prone to switch to competing products as a result of sales promotion than loyal customer
Security in transnational interoperable PPDR communications: threats and requirements
The relevance of cross border security operations
has been identified as a priority at European level for a long time.
A European network where Public Protection and Disaster Relief
(PPDR) forces share communications processes and a legal
framework would greatly enforce response to disaster recovery
and security against crime. Nevertheless, uncertainty on costs,
timescale and functionalities have slowed down the
interconnection of PPDR networks across countries and limited
the transnational cooperation of their PPDR forces so far. In this
context, the European research project ISITEP is aimed at
developing the legal, operational and technical framework to
achieve a cost effective solution for PPDR interoperability across
European countries. Inter alia, ISITEP project is specifying a
new Inter-System-Interface (ISI) interface for the
interconnection of current TETRA and TETRAPOL networks
that can be deployed over Internet Protocol (IP) connectivity.
This approach turns communications security as a central aspect
to consider when deploying the new IP ISI protocol between
PPDR national networks. Ensuring that threats to the
interconnected communications systems and terminals are
sufficiently and appropriately reduced by technical, procedural
and environmental countermeasures is vital to realise the trusted
and secure communication system needed for the pursued PPDR
transnational cooperation activities. In this context, this paper
describes the framework and methodology defined to carry out
the development of the security requirements and provides a
discussion on the undertaken security risk and vulnerability
analysis.Peer ReviewedPostprint (author's final draft
- âŠ