942 research outputs found
Towards a killer app for the Semantic Web
Killer apps are highly transformative technologies that create new markets and widespread patterns of behaviour. IT generally, and the Web in particular, has benefited from killer apps to create new networks of users and increase its value. The Semantic Web community on the other hand is still awaiting a killer app that proves the superiority of its technologies. There are certain features that distinguish killer apps from other ordinary applications. This paper examines those features in the context of the Semantic Web, in the hope that a better understanding of the characteristics of killer apps might encourage their consideration when developing Semantic Web applications
A Political Economy of Privatization Contracts : The Case of Water and Sanitation in Ghana and Argentina
This document is the Accepted Manuscript version of the following article: Hulya Dagdeviren, Simon A. Robertson, 'A Political Economy of Privatization Contracts: The Case of Water and Sanitation in Ghana and Argentina', Competition & Change, Vol. 18 (2): 150-163, April 2014. The final, published version is available online at DOI: https://doi.org/10.1179/1024529414Z.00000000053. Published by SAGE.In general, the process and outcomes of privatization have been studied from the point of view of efficiency. In this article, we consider issues in the course of contract design, implementation, management and enforcement in privatized public services and utilities. The study is based on two case studies, involving several water concessions in Argentina and a management contract in the urban water sector in Ghana. Three key arguments are presented on the basis of these case studies. The first is that an individualistic analytical framework is often utilized by the mainstream economic perspectives, but these are inadequate for a comparative assessment of private versus public provision in public services where there are distinct collective or group interests and hence a wider socio-economic context and representation of different interests becomes highly important. Instead, the article proposes a political economy perspective, which pays due attention to distributional issues, group interests, ideology of states and power relations for the assessment of privatization contracts. Second, the administrative capacity of states and their resources play a key role for the outcomes of privatization. Finally, while some contractual issues could be resolved through resourcing and experience over time, others are inherent to the contractual relations with little prospect of remedy.Peer reviewe
Procurement push and marketing pull in supply chain management: the conceptual contribution of relationship marketing as a driver in project financial performance
? The agenda for supply management practices on construction projects originated from clients. It is largely procurement driven, the dominant strategy of contractors being to emulate the client approach, and hence push the procurement model along the chain.? This procurement push along the supply chain translates the intrinsic client interest in value into a contractor interest in repeat business from the same client or through referral markets, the consequence being: (i) loss of interest in adding further value along the chain, (ii) continuous improvement prematurely reaches the law of diminishing returns through a primary cost reduction focus, (iii) supply chains may be rationalised in terms of the number of suppliers for each link in the chain, yet the procurement push increases chain length in order to squeeze the lowest costs possible, hence those doing the work at the bottom of the chain will not have the resources to add value nor necessarily be aware of the strategic principles at the top of the chain. ? Marketing is the other side of the same ?procurement coin?; relationship marketing (RM) soliciting a pull in the supply chain, potentially adding value for continuous improvement. ? Finally, the RM approach will be related to the theoretical and actual decoupling point for construction, with the potential to move the point towards the start of the chain, hence increasing the potential for agile manufacturing
Financialization directing strategy
Original article can be found at: http://www.sciencedirect.com/science/journal/01559982 Copyright Elsevier Ltd. DOI: 10.1016/j.accfor.2008.08.001This paper constructs an account of how financialization is directing strategy in the S&P 500. Financialization describes how changes in US accounting regulations require firms to account for the market value of capital market transactions where corporate strategy is not simply concerned with delivering value creation but also reacting to value absorption in an era of shareholder value. Financialization is directing strategy and arbitrage to modify stakeholder financial settlements where an increased share of income is extracted as surplus cash and more of this cash from operations is being distributed to shareholders. Share buy-backs account for a substantial increase in the share of corporate cash distributed to shareholders in the S&P 500 which, we argue, reflects a strategic process of value creation and value absorption.Peer reviewe
Trust and control interrelations: New perspectives on the trust control nexus
This article is the post-print version of the published article that may be accessed at the link below. Copyright @ 2007 Sage Publications.This article introduces the special issue on New Perspectives on the Trust-Control Nexus in Organizational Relations. Trust and control are interlinked processes commonly seen as key to reach effectiveness in inter- and intraorganizational relations. The relation between trust and control is, however, a complex one, and research into this relation has given rise to various and contradictory interpretations of how trust and control relate. A well-known discussion is directed at whether trust and control are better conceived as substitutes, or as complementary mechanisms of governance. The articles in this special issue bring the discussion on the relationship between both concepts a step further by identifying common factors, distinctive mechanisms, and key implications relevant for theory building and empirical research. By studying trust and control through different perspectives and at different levels of analysis, the articles provide new theoretical insights and empirical evidence on the foundations of the trust-control interrelations
Generating Sustainable Value from Open Data in a Sharing Society
Part 1: Creating ValueInternational audienceOur societies are in the midst of a paradigm shift that transforms hierarchal markets into an open and networked economy based on digital technology and information. In that context, open data is widely presumed to have a positive effect on social, environmental and economic value; however the evidence to that effect has remained scarce. Subsequently, we address the question how the use of open data can stimulate the generation of sustainable value. We argue that open data sharing and reuse can empower new ways of generating value in the sharing society. Moreover, we propose a model that describes how different mechanisms that take part within an open system generate sustainable value. These mechanisms are enabled by a number of contextual factors that provide individuals with the motivation, opportunity and ability to generate sustainable value
The Behavioral Roots of Information Systems Security:Exploring Key Factors Related to Unethical IT Use
Unethical information technology (IT) use, related to activities such as hacking, software piracy, phishing, and spoofing, has become a major security concern for individuals, organizations, and society in terms of the threat to information systems (IS) security. While there is a growing body of work on this phenomenon, we notice several gaps, limitations, and inconsistencies in the literature. In order to further understand this complex phenomenon and reconcile past findings, we conduct an exploratory study to uncover the nomological network of key constructs salient to this phenomenon, and the nature of their interrelationships. Using a scenario-based study of young adult participants, and both linear and nonlinear analyses, we uncover key nuances of this phenomenon of unethical IT use. We find that unethical IT use is a complex phenomenon, often characterized by nonlinear and idiosyncratic relationships between the constructs that capture it. Overall, ethical beliefs held by the individuals, along with economic, social, and technological considerations are found to be relevant to this phenomenon. In terms of practical implications, these results suggest that multiple interventions at various levels may be required to combat this growing threat to IS security
Foliations of Isonergy Surfaces and Singularities of Curves
It is well known that changes in the Liouville foliations of the isoenergy
surfaces of an integrable system imply that the bifurcation set has
singularities at the corresponding energy level. We formulate certain
genericity assumptions for two degrees of freedom integrable systems and we
prove the opposite statement: the essential critical points of the bifurcation
set appear only if the Liouville foliations of the isoenergy surfaces change at
the corresponding energy levels. Along the proof, we give full classification
of the structure of the isoenergy surfaces near the critical set under our
genericity assumptions and we give their complete list using Fomenko graphs.
This may be viewed as a step towards completing the Smale program for relating
the energy surfaces foliation structure to singularities of the momentum
mappings for non-degenerate integrable two degrees of freedom systems.Comment: 30 pages, 19 figure
Mechanical stability of the CMS strip tracker measured with a laser alignment system
Peer reviewe
Customer Satisfaction with and Loyalty towards Online Travel Products: A Transaction Cost Economics Perspective
- …
