145 research outputs found

    How and why communications industry suppliers get “squeezed out” by outsourcing: cases, impact and the next phases

    Get PDF
    The communications systems,terminals,and service, industries, have undergone over the past ten years a significant technological internal evolution and external revolution at customer end (such as shifting to IP, wireless 3G and LTE evolutions, new terminals, broadband...). Very little management research has studied their survivability irrespective of changes in demand volumes, due to technological sourcing and outsourcing practices driven by other global industries serving as predators in view of the huge business potential of communications products and services. These other industries include computing software, semiconductor and contract manufacturing industries, many of with roots in emerging countries. This paper analyzes the implications of using in-sourced genuine non-proprietary open communications standards , of the wider use of in-sourced /purchased technologies ,and of outsourced contract manufacturing . The methodology used is equilibrium analyses from case analysis data. They show a trend towards active or passive knowledge leakage. Three specific areas will be mentioned as examples .The paper also shows the processes how eventually those industries in a later cycle bounce back.Communications industry; Communications industry suppliers; Business processes; Intellectual property; Technical competence; Customer bases

    Discovering the dynamics of smart business networks

    Get PDF
    Earlier research discussed the necessary evolution from smart business networks, as based on process need satisfaction and governance, into business genetics [1] based on strategic bonds or decay and opportunistic complementarities. This paper will describe an approach and diffusion algorithms whereby to discover the dynamics of emergent smart business network structures and their performance in view of collaboration patterns over time. Some real life early analyses of dynamics are discussed based on cases and date from the high tech sector. Lessons learnt from such cases are also given on overall smart network dynamics with respect to local interaction strategies, as modelled like in business genetics by individual partner profiles, goals and constraints. It shows the weakness of static “business operating systems”, as well as the possibly destabilizing clustering effects amongst nodes linked to filtering, evaluation and own preferences.smart business networks; business genetics; network performance; SBN; dynamics

    Privacy metrics and boundaries

    Get PDF
    This paper aims at defining a set of privacy metrics (quantitative and qualitative) in the case of the relation between a privacy protector ,and an information gatherer .The aims with such metrics are : -to allow to assess and compare different user scenarios and their differences ;for examples of scenarios see [4]; -to define a notion of privacy boundary, and design it to encompass the set of information , behaviours , actions and processes which the privacy protector can accept to expose to an information gathering under an agreement with said party ; everything outside the boundary is not acceptable and justifies not entering into the agreement ; -to characterize the contribution of privacy enhancing technologies (PET). A full case is given with the qualitative and quantitative privacy metrics determination and envelope, i.e. a Cisco Inc. privacy agreement.Privacy; Metrics; Set theory; Economics; Privacy enhancing technologies

    Business and social evaluation of denial of service attacks in view of scaling economic counter-measures

    Get PDF
    This paper gives an analytical method to determine the economic and indirect implications of denial of service and distributed denial of service attacks. It is based on time preference dynamics applied to the monetary mass for the restoration of capabilities, on long term investments to rebuild capabilities, and of the usability level of the capabilities after an attack. A simple illustrative example is provided for a denial of service on a corporate data centre. The needed data collection methodologies are categorized by classes of targets. The use of the method is explained in the context of legal or policy driven dissuasive, retaliation or compensation/ restoration actions. A concrete set of deployment cases in the communications service and transport industries is discussed. The conclusion includes policy recommendations as well as information exchange requirements.Cyberwar; Denial of service; Business implications; Social implications; Mobile communications; Insurance

    ERP project’s internal stakeholder network and how it influences the project’s outcome

    Get PDF
    So far little effort has been put into researching the importance of internal ERP project stakeholders’ mutual interactions, realizing the project’s complexity, influence on the whole organization, and high risk for a useful final outcome. This research analyzes the stakeholders’ interactions and positions in the project network, their criticality, potential bottlenecks and conflicts. The main methods used are Social Network Analysis, and the elicitation of drivers for the individual players. Information was collected from several stakeholders from three large ERP projects all in global companies headquartered in Finland,together with representatives from two different ERP vendors, and with two experienced ERP consultants. The analysis gives quantitative as well as qualitative characterization of stakeholder criticality (mostly the Project Manager(s), the Business Owner(s) and the Process Owner(s)) , degree of centrality, closeness , mediating or bottleneck roles, relational ties and conflicts (individual, besides those between business and project organizations) , and clique formations. A generic internal stakeholder network model is established as well as the criticality of the project phases. The results are summarized in the form of a list of recommendations for future ERP projects to address the internal stakeholder impacts .Project management should utilize the latest technology to provide tools to increase the interaction between the stakeholders and to monitor the strength of these relations. Social network analysis tools could be used in the projects to visualize the stakeholder relations in order to better understand the possible risks related to the relations (or lack of them).ERP; Social networks ; Enterprise resource planning; Stakeholders

    Privacy metrics and boundaries

    Get PDF
    This paper aims at defining a set of privacy metrics (quantitative and qualitative) in the case of the relation between a privacy protector ,and an information gatherer .The aims with such metrics are : -to allow to assess and compare different user scenarios and their differences ;for examples of scenarios see [4]; -to define a notion of privacy boundary, and design it to encompass the set of information , behaviours , actions and processes which the privacy protector can accept to expose to an information gathering under an agreement with said party ; everything outside the boundary is not acceptable and justifies not entering into the agreement ; -to characterize the contribution of privacy enhancing technologies (PET). A full case is given with the qualitative and quantitative privacy metrics determination and envelope, i.e. a Cisco Inc. privacy agreement

    Privacy Management Contracts And Economics, Using Service Level Agreements (Sla)

    Get PDF
    Recognizing the importance of privacy management as a business process and a business support process, this paper proposes the use of service level agreements around privacy features, including qualitative and quantitative ones. It also casts privacy management into a business perspective with benefits and costs to either party in a process

    Discovering the Dynamics of Smart Business Networks

    Get PDF
    In an earlier paper ,was discussed the necessary evolution from smart business networks, as based on process need satisfaction and governance, into business genetics [1] based on strategic bonds or decay and opportunistic complementarities. This paper will describe an approach and diffusion algorithms whereby to discover the dynamics of emergent smart business network structures and their performance in view of collaboration patterns over time. Some real life early analyses of dynamics are discussed based on cases and date from the high tech sector. Lessons learnt from such cases are also given on overall smart network dynamics with respect to local interaction strategies, as modelled like in business genetics by individual partner profiles, goals and constraints. It shows the weakness of static "business operating systems", as well as the possibly destabilizing clustering effects amongst nodes linked to filtering, evaluation and own preferences

    A Business Evaluation Of The Next Generation Ipv6 Protocol In Fixed And Mobile Communication Services

    Get PDF
    This paper gives an analytical business model of the Internet IPv4 and IPv6 protocols ,focussing on the business implications of intrinsic technical properties of these protocols .The technical properties modeled in business terms are : address space, payload, autoconfiguration, IP mobility , security, and flow label. Three operational cash flow focussed performance indexes are defined for respectively an Internet operator or ISP, for the address domain owner, and for the end user. Special considerations are made and modeling changes for mobile Internet traffic. The effects of technical innovation in the Internet services and protocols is taken into account , as are special considerations for N.A.T. and content owners. A numerical case is provided which mimics the current state of the Internet network and services ,and around which sensitivity analysis can be carried out, or such that additional service models can be added. It establishes in the Case the relative advantages or disadvantages of IPv4 and IPv6 for each of the three main parties ,i.e. the ISP operator, the address domain owner, and the end use

    Smart business networks: architectural aspects and risks

    Get PDF
    This paper summarizes key attributes and the uniqueness of smart business networks [1], to propose thereafter an operational implementation architecture. It involves, amongst others, the embedding of business logic specific to a network of business partners, inside the communications control networks .It also involves the definition of business protocols between these partners and the joint management of some common functions relying on open networking standards. This implies some key paradigm changes, both of a technical and of a business nature, which are offered here for discussion via a set of propositions
    • 

    corecore