Search results for: Definition.
216 The Link between Financial and Overall Corporate Strategies
Authors: Jaroslav Pavlíček
Abstract:
Company strategy expresses a basic idea of how to reach company objectives. A whole range of models of strategic management are used in practice. The concept of strategic management should fulfill some basic requirements to make it applicable for both the typical, but also more specific company environment. The financial strategy plays an important role in corporate strategy. The paper develops a methodology of strategic model implementing into the category of micro, small and medium-sized enterprises (SMEs). Furthermore, the methodology recommends procedures while solving an up-to-date worldwide task of the definition of the company strategy and its financial strategy.
Keywords: corporate strategy, financial strategy, corporate planning
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1953215 Architecture Exception Governance
Authors: Ondruska Marek
Abstract:
The article presents the whole model of IS/IT architecture exception governance. As first, the assumptions of presented model are set. As next, there is defined a generic governance model that serves as a basis for the architecture exception governance. The architecture exception definition and its attributes follow. The model respects well known approaches to the area that are described in the text, but it adopts higher granularity in description and expands the process view with all the next necessary governance components as roles, principles and policies, tools to enable the implementation of the model into organizations. The architecture exception process is decomposed into a set of processes related to the architecture exception lifecycle consisting of set of phases and architecture exception states. Finally, there is information about my future research related to this area.Keywords: Architecture, dispensation, exception, governance, model
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2477214 3D Definition for Human Smiles
Authors: Shyue-Ran Li, Kuohsiang Chen
Abstract:
The study explored varied types of human smiles and extracted most of the key factors affecting the smiles. These key factors then were converted into a set of control points which could serve to satisfy the needs for creation of facial expression for 3D animators and be further applied to the face simulation for robots in the future. First, hundreds of human smile pictures were collected and analyzed to identify the key factors for face expression. Then, the factors were converted into a set of control points and sizing parameters calculated proportionally. Finally, two different faces were constructed for validating the parameters via the process of simulating smiles of the same type as the original one.Keywords: 3D animation, facial expression, numerical, robot, smile parameter.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1511213 Do Students Really Understand Topology in the Lesson? A Case Study
Authors: Serkan Narli
Abstract:
This study aims to specify to what extent students understand topology during the lesson and to determine possible misconceptions. 14 teacher trainees registered at Secondary School Mathematics education department were observed in the topology lessons throughout a semester and data collected at the first topology lesson is presented here. Students- knowledge was evaluated using a written test right before and after the topology lesson. Thus, what the students learnt in terms of the definition and examples of topologic space were specified as well as possible misconceptions. The findings indicated that students did not fully comprehend the topic and misunderstandings were due to insufficient pre-requisite knowledge of abstract mathematical topics and mathematical notation.Keywords: Mathematics Education, Teacher Education, Topology.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1449212 Knowledge Based Concept Analysis Method using Concept Maps and UML: Security Notion Case
Authors: Miquel Colobran, Josep M. Basart
Abstract:
One of the most ancient humankind concerns is knowledge formalization i.e. what a concept is. Concept Analysis, a branch of analytical philosophy, relies on the purpose of decompose the elements, relations and meanings of a concept. This paper aims at presenting a method to make a concept analysis obtaining a knowledge representation suitable to be processed by a computer system using either object-oriented or ontology technologies. Security notion is, usually, known as a set of different concepts related to “some kind of protection". Our method concludes that a more general framework for the concept, despite it is dynamic, is possible and any particular definition (instantiation) depends on the elements used by its construction instead of the concept itself.
Keywords: Concept analysis, Knowledge representation, Security, UML.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2391211 The Linguistic and Legal Term
Authors: Adam Niewiadomski
Abstract:
The research objective of the project and article “The Linguistic and Legal Term "Real Estate" in the Polish Law and Literature” is characteristic of legal regulations in contemporary countries is the abundance of legal definitions, which are, in fact, formulated separately for the needs of each legal act. This situation does not create favourable conditions for comprehensibility and effectiveness of the law created. The definition mess leads to various interpretations of the same legal circumstances and does not support normal business trading. It needs to be pointed out that using numerous references within a legal act and to other legal acts results in new legal definitions being created for the needs of a given decision by the authority which issues the decision in question. Such interpretation freedom may lead to the law being misused, not to mention being instrumentalised.
Keywords: Real estate, linguistic, legal term.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1460210 Liberation as a Method for Monument Valorisation: The Case of the Defence Heritage Restoration
Authors: Donatella R. Fiorino, Marzia Loddo
Abstract:
The practice of freeing monuments from subsequent additions crosses the entire history of conservation and it is traditionally connected to the aim of valorisation, both for cultural and educational purpose and recently even for touristic exploitation. Defence heritage has been widely interested by these cultural and technical moods from philological restoration to critic innovations. A renovated critical analysis of Italian episodes and in particular the Sardinian case of the area of San Pancrazio in Cagliari, constitute an important lesson about the limits of this practice and the uncertainty in terms of results, towards the definition of a sustainable good practice in the restoration of military architectures.
Keywords: Defensive architecture, Liberation, Valorisation for tourism, Historical restoration.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2096209 A Brief Study about Nonparametric Adherence Tests
Authors: Vinicius R. Domingues, Luan C. S. M. Ozelim
Abstract:
The statistical study has become indispensable for various fields of knowledge. Not any different, in Geotechnics the study of probabilistic and statistical methods has gained power considering its use in characterizing the uncertainties inherent in soil properties. One of the situations where engineers are constantly faced is the definition of a probability distribution that represents significantly the sampled data. To be able to discard bad distributions, goodness-of-fit tests are necessary. In this paper, three non-parametric goodness-of-fit tests are applied to a data set computationally generated to test the goodness-of-fit of them to a series of known distributions. It is shown that the use of normal distribution does not always provide satisfactory results regarding physical and behavioral representation of the modeled parameters.Keywords: Kolmogorov-Smirnov, Anderson-Darling, Cramer-Von-Mises, Nonparametric adherence tests.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1843208 Condensation of Moist Air in Heat Exchanger Using CFD
Authors: Jan Barák, Karel Fraňa, Jörg Stiller
Abstract:
This work presents results of moist air condensation in heat exchanger. It describes theoretical knowledge and definition of moist air. Model with geometry of square canal was created for better understanding and postprocessing of condensation phenomena. Different approaches were examined on this model to find suitable software and model. Obtained knowledge was applied to geometry of real heat exchanger and results from experiment were compared with numerical results. One of the goals is to solve this issue without creating any user defined function in the applied code. It also contains summary of knowledge and outlook for future work.
Keywords: Condensation, exchanger, experiment, validation.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 5590207 Relational Framework and its Applications
Authors: Lidia Obojska
Abstract:
This paper has, as its point of departure, the foundational axiomatic theory of E. De Giorgi (1996, Scuola Normale Superiore di Pisa, Preprints di Matematica 26, 1), based on two primitive notions of quality and relation. With the introduction of a unary relation, we develop a system totally based on the sole primitive notion of relation. Such a modification enables a definition of the concept of dynamic unary relation. In this way we construct a simple language capable to express other well known theories such as Robinson-s arithmetic or a piece of a theory of concatenation. A key role in this system plays an abstract relation designated by “( )", which can be interpreted in different ways, but in this paper we will focus on the case when we can perform computations and obtain results.Keywords: language, unary relations, arithmetic, computability
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1260206 Similarity Based Membership of Elements to Uncertain Concept in Information System
Authors: M. Kamel El-Sayed
Abstract:
The process of determining the degree of membership for an element to an uncertain concept has been found in many ways, using equivalence and symmetry relations in information systems. In the case of similarity, these methods did not take into account the degree of symmetry between elements. In this paper, we use a new definition for finding the membership based on the degree of symmetry. We provide an example to clarify the suggested methods and compare it with previous methods. This method opens the door to more accurate decisions in information systems.
Keywords: Information system, uncertain concept, membership function, similarity relation, degree of similarity.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 810205 STRPRO Tool for Manipulation of Stratified Programs Based on SEPN
Authors: Chadlia Jerad, Amel Grissa-Touzi, Habib Ounelli
Abstract:
Negation is useful in the majority of the real world applications. However, its introduction leads to semantic and canonical problems. SEPN nets are well adapted extension of predicate nets for the definition and manipulation of stratified programs. This formalism is characterized by two main contributions. The first concerns the management of the whole class of stratified programs. The second contribution is related to usual operations optimization (maximal stratification, incremental updates ...). We propose, in this paper, useful algorithms for manipulating stratified programs using SEPN. These algorithms were implemented and validated with STRPRO tool.
Keywords: stratified programs, update operations, SEPN formalism, algorithms, STRPRO.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1267204 Web Information System for e-Learning
Authors: Anna Angelini, Enrica Gentile, Paola Plantamura, Vito Leonardo Plantamura
Abstract:
A suitable e-learning system management needs to carry out a web-information system in order to allow integrated fruition of data and metadata concerning the activities typical of elearning environment. The definition of a “web information system" for e-learning takes advantage of the potentialities of Web technologies both as for the access to metadata present on the several platforms, and as for the implementation of courseware which make up the relative didactic environment. What information systems have in common is the technological environment on which they are generally implemented and the use of metadata in order to structure information at all cognitive and organization levels. In this work we are going to define a methodology for the implementation of a specific web information system for an e-learning environment.Keywords: e-learning, information systems, coursemanagement, web-based system.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1595203 A Critical Study of Media Profiling on Society-s Social Problems from a British Perspective
Authors: Cj Gletus Matthews Cn Jacobs, Kogilah Narayanasamy
Abstract:
This article explores the sociological perspectives on social problems and the role of the media which has a delicate role to tread in balancing its duty to the public and the victim Whilst social problems have objective conditions, it is the subjective definition of such problems that ensure which social problem comes to the fore and which doesn-t. Further it explores the roles and functions of policymakers when addressing social problems and the impact of the inception of media profiling as well as the advantages and disadvantages of media profiling towards social problems. It focuses on the inception of media profiling due to its length and a follow up article will explore how current media profiling towards social problems have evolved since its inception.Keywords: Media Profiling, Policy Response, Social Problems
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1327202 Performance Assessment and Optimization of the After-Sale Networks
Authors: H. Izadbakhsh, M.Hour Ali, A. Amirkhani, A. Montazeri, M. Saberi
Abstract:
The after–sales activities are nowadays acknowledged as a relevant source of revenue, profit and competitive advantage in most manufacturing industries. Top and middle management, therefore, should focus on the definition of a structured business performance measurement system for the after-sales business. The paper aims at filling this gap, and presents an integrated methodology for the after-sales network performance measurement, and provides an empirical application to automotive case companies and their official service network. This is the first study that presents an integrated multivariate approach for total assessment and improvement of after-sale services.Keywords: Data Envelopment Analysis (DEA), Principal Component Analysis (PCA), Automotive companies, After-sale services.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1886201 A Novel Method for Behavior Modeling in Uncertain Information Systems
Authors: Ali Haroonabadi, Mohammad Teshnehlab
Abstract:
None of the processing models in the software development has explained the software systems performance evaluation and modeling; likewise, there exist uncertainty in the information systems because of the natural essence of requirements, and this may cause other challenges in the processing of software development. By definition an extended version of UML (Fuzzy- UML), the functional requirements of the software defined uncertainly would be supported. In this study, the behavioral description of uncertain information systems by the aid of fuzzy-state diagram is crucial; moreover, the introduction of behavioral diagrams role in F-UML is investigated in software performance modeling process. To get the aim, a fuzzy sub-profile is used.Keywords: Fuzzy System, Software Development Model, Software Performance Evaluation, UML
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2498200 Comparing Transformational Leadership in Successful and Unsuccessful Companies
Authors: Gh. Jandaghi, H. Zarei Matin, A. Farjami
Abstract:
In this article, while it is attempted to describe the problem and its importance, transformational leadership is studied by considering leadership theories. Issues such as the definition of transformational leadership and its aspects are compared on the basis of the ideas of various connoisseurs and then it (transformational leadership) is examined in successful and unsuccessful companies. According to the methodology, the method of research, hypotheses, population and statistical sample are investigated and research findings are analyzed by using descriptive and inferential statistical methods in the framework of analytical tables. Finally, our conclusion is provided by considering the results of statistical tests. The final result shows that transformational leadership is significantly higher in successful companies than unsuccessful ones P<0.0001).Keywords: Idealized influence, individualized considerations, inspirational motivation, intellectual stimulation, transformational leadership
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 4618199 Single Valued Neutrosophic Hesitant Fuzzy Rough Set and Its Application
Authors: K. M. Alsager, N. O. Alshehri
Abstract:
In this paper, we proposed the notion of single valued neutrosophic hesitant fuzzy rough set, by combining single valued neutrosophic hesitant fuzzy set and rough set. The combination of single valued neutrosophic hesitant fuzzy set and rough set is a powerful tool for dealing with uncertainty, granularity and incompleteness of knowledge in information systems. We presented both definition and some basic properties of the proposed model. Finally, we gave a general approach which is applied to a decision making problem in disease diagnoses, and demonstrated the effectiveness of the approach by a numerical example.Keywords: Single valued neutrosophic hesitant set, single valued neutrosophic hesitant relation, single valued neutrosophic hesitant fuzzy rough set, decision making method.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1289198 Web Service Security Method To SOA Development
Authors: Nafise Fareghzadeh
Abstract:
Web services provide significant new benefits for SOAbased applications, but they also expose significant new security risks. There are huge number of WS security standards and processes. At present, there is still a lack of a comprehensive approach which offers a methodical development in the construction of secure WS-based SOA. Thus, the main objective of this paper is to address this needs, presenting a comprehensive method for Web Services Security guaranty in SOA. The proposed method defines three stages, Initial Security Analysis, Architectural Security Guaranty and WS Security Standards Identification. These facilitate, respectively, the definition and analysis of WS-specific security requirements, the development of a WS-based security architecture and the identification of the related WS security standards that the security architecture must articulate in order to implement the security services.Keywords: Kernel, Repository, Security Standards, WS Security Policy, WS specification.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1427197 Human Interactive E-learning Systems using Head Posture Images
Authors: Yucel Ugurlu
Abstract:
This paper explains a novel approach to human interactive e-learning systems using head posture images. Students- face and hair information are used to identify a human presence and estimate the gaze direction. We then define the human-computer interaction level and test the definition using ten students and seventy different posture images. The experimental results show that head posture images provide adequate information for increasing human-computer interaction in e-learning systems.
Keywords: E-learning, image segmentation, human-presence, gaze-direction, human-computer interaction, LabVIEW
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1624196 The Application of Action Research to Integrate the Innovation in Learning Experience in a Design Course
Authors: Walaa Mohammed Metwally
Abstract:
This case study used the action research concept as a tool to integrate the innovation in a learning experience on a design course. The action research was investigated at Prince Sultan University, College of Engineering in the Interior Design and Architecture Department in January 2015, through the Higher Education Academy program. The action research was presented first with the definition of the research, leading to how it was used and how solutions were found. It concluded by showing that once the action research application in interior design and architecture were studied it was an effective tool to improve student’s learning, develop their practice in design courses, and it discussed the negative and positive issues that were encountered.Keywords: Action research, innovation, intervention, learning experience, peer review.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1581195 Variable-Relation Criterion for Analysis of the Memristor
Authors: Qingjiang Li, Hui Xu, Haijun Liu, Xiaobo Tian
Abstract:
To judge whether the memristor can be interpreted as the fourth fundamental circuit element, we propose a variable-relation criterion of fundamental circuit elements. According to the criterion, we investigate the nature of three fundamental circuit elements and the memristor. From the perspective of variables relation, the memristor builds a direct relation between the voltage across it and the current through it, instead of a direct relation between the magnetic flux and the charge. Thus, it is better to characterize the memristor and the resistor as two special cases of the same fundamental circuit element, which is the memristive system in Chua-s new framework. Finally, the definition of memristor is refined according to the difference between the magnetic flux and the flux linkage.Keywords: Memristor, Fundamental, Variable-Relation Criterion, Memristive system
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1677194 Project Management and Software Development Processes: Integrating PMBOK and OPEN
Authors: Maurício Covolan Rosito, Daniel Antonio Callegari, Ricardo Melo Bastos
Abstract:
Software organizations are constantly looking for better solutions when designing and using well-defined software processes for the development of their products and services. However, while the technical aspects are virtually easier to arrange, many software development processes lack more support on project management issues. When adopting such processes, an organization needs to apply good project management skills along with technical views provided by those models. This research proposes the definition of a new model that integrates the concepts of PMBOK and those available on the OPEN metamodel, helping not only process integration but also building the steps towards a more comprehensive and automatable model.Keywords: OPEN metamodel, PMBOK metamodel, Project Management, Software Process
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3212193 Security Engine Management of Router based on Security Policy
Authors: Su Hyung Jo, Ki Young Kim, Sang Ho Lee
Abstract:
Security management has changed from the management of security equipments and useful interface to manager. It analyzes the whole security conditions of network and preserves the network services from attacks. Secure router technology has security functions, such as intrusion detection, IPsec(IP Security) and access control, are applied to legacy router for secure networking. It controls an unauthorized router access and detects an illegal network intrusion. This paper relates to a security engine management of router based on a security policy, which is the definition of security function against a network intrusion. This paper explains the security policy and designs the structure of security engine management framework.Keywords: Policy server, security engine, security management, security policy
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1922192 Modeling of the Process Parameters using Soft Computing Techniques
Authors: Miodrag T. Manić, Dejan I. Tanikić, Miloš S. Stojković, Dalibor M. ðenadić
Abstract:
The design of technological procedures for manufacturing certain products demands the definition and optimization of technological process parameters. Their determination depends on the model of the process itself and its complexity. Certain processes do not have an adequate mathematical model, thus they are modeled using heuristic methods. First part of this paper presents a state of the art of using soft computing techniques in manufacturing processes from the perspective of applicability in modern CAx systems. Methods of artificial intelligence which can be used for this purpose are analyzed. The second part of this paper shows some of the developed models of certain processes, as well as their applicability in the actual calculation of parameters of some technological processes within the design system from the viewpoint of productivity.Keywords: fuzzy logic, manufacturing, neural networks
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1912191 Analysis of Classifications of Unsolicited Bulk Emails
Authors: Jatinderkumar R. Saini, Apurva A. Desai
Abstract:
In recent times, the problem of Unsolicited Bulk Email (UBE) or commonly known as Spam Email, has increased at a tremendous growth rate. We present an analysis of survey based on classifications of UBE in various research works. There are many research instances for classification between spam and non-spam emails but very few research instances are available for classification of spam emails, per se. This paper does not intend to assert some UBE classification to be better than the others nor does it propose any new classification but it bemoans the lack of harmony on number and definition of categories proposed by different researchers. The paper also elaborates on factors like intent of spammer, content of UBE and ambiguity in different categories as proposed in related research works of classifications of UBE.Keywords: E-mail, Scams, Spam Email, Unsolicited Bulk Email(UBE)
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1728190 A Review of Survey Methodology Employedin IT Outsourcing
Authors: B. Terzioglu, E.S.K. Chan
Abstract:
The purpose of this paper is to provide an overview on methodological aspects of the information technology outsourcing (ITO) surveys, in an attempt to improve the data quality and reporting in survey research. It is based on a review of thirty articles on ITO surveys and focuses on two commonly explored dimensions of ITO, namely what are outsourced and why should there be ITO. This study highlights weaknesses in ITO surveys including lack of a clear definition of population, lack of information regarding the sampling method used, not citing the response rate, no information pertaining to pilot testing of survey instrument and absence of information on internal validity in the use or reporting of surveys. This study represents an attempt with a limited scope to point to shortfalls in the use survey methodology in ITO, and thus raise awareness among researchers in enhancing the reliability of survey findings.
Keywords: ITO, information technology outsourcing, survey methodology
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1854189 Devising a Paradigm for the Assessment of Guilt across Species
Authors: Trisha S. Malhotra
Abstract:
While there exist frameworks to study the induction, manifestation, duration and general nature of emotions like shame, guilt, embarrassment and pride in humans, the same cannot be said for other species. This is because such 'complex' emotions have situational inductions and manifestations that supposedly vary due to differences between and within different species' ethology. This paper looks at the socio-adaptive functions of guilt to posit why this emotion might be observed across varying species. Primarily, the experimental paradigm of guilt-assessment in domesticated dogs is critiqued for lack of ethological consideration in its measurement and analysis. It is argued that a paradigm for guilt-assessment should measure the species-specific prosocial approach behavior instead of the immediate feedback of the 'guilty'. Finally, it is asserted that the origin of guilt is subjective and if it must be studied across a plethora of species, its definition must be tailored to fit accordingly.Keywords: Guilt, assessment, dogs, prosocial approach behavior, empathy, species, ethology.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 903188 User Experience Evolution Lifecycle Framework
Authors: Maissom Qanber Abbasi, Philip Lew, Irfan Rafique, Zhang Li
Abstract:
Perceptions of quality from both designers and users perspective have now stretched beyond the traditional usability, incorporating abstract and subjective concepts. This has led to a shift in human computer interaction research communities- focus; a shift that focuses on achieving user experience (UX) by not only fulfilling conventional usability needs but also those that go beyond them. The term UX, although widely spread and given significant importance, lacks consensus in its unified definition. In this paper, we survey various UX definitions and modeling frameworks and examine them as the foundation for proposing a UX evolution lifecycle framework for understanding UX in detail. In the proposed framework we identify the building blocks of UX and discuss how UX evolves in various phases. The framework can be used as a tool to understand experience requirements and evaluate them, resulting in better UX design and hence improved user satisfaction.Keywords: Usability, user experience lifecycle, user satisfaction
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2634187 The Importance of Customer Engagement and Service Innovation in Value Co-Creation
Authors: Soheila Raeisi, Meng Lingjie
Abstract:
The interaction of customers with businesses is a process that is critical to the running of those businesses. Different levels of customer engagement and service innovation exist when pursuing value co-creation endeavors. The important thing in this whole process is for business managers know the benefits that can be realized when these activities are pursued effectively. The purpose of this paper is to first identify the importance of value co-creation when pursued via customer engagement and service innovation. Secondly, it will also identify the conditions under which value co-destruction can occur on the same. The background of the topic will be reviewed followed by the literature review with a special focus on the definition of these terms and the research design to be used. The research found that it is beneficial to have a strong relationship between stakeholders and the business in order to have strong customer engagement and service innovation.
Keywords: Customer engagement, service innovation, value co-creation, value co-destruction.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3162