نتایج جستجو برای: vendor

تعداد نتایج: 8178  

2017
Sylvia Hristakeva

Producers frequently provide retailers with financial incentives to secure distribution of their products. These payments often take the form of vendor allowances: lumpsum transfers to retailers that do not directly depend on quantity sold. I study the equilibrium effects of the use of vendor allowances when retailers’ product selections are endogenous. I find that these payments are important ...

2009
Atul Borade Satish Bansod

An effective supply chain management practice improves the profitability and responsiveness of organizations. Like multinationals, small-scale enterprises are also capitalizing this feat. This paper presents a case study of a two level supply chain setting. Here a small enterprise i.e. vendor manages the inventory of the retailer. Vendor develops the forecasts and a database for replenishment d...

2012
Jakob Heumann Martin Wiener Ulrich Remus

Controlling IS offshoring projects is a great challenge because of the inherent uncertainty of such projects. In such settings, informal controls are assumed to become increasingly effective. However, still little is known about the factors that influence the effectiveness of informal controls. We argue that the vendor manager’s power distance orientation—a key cultural construct that reflects ...

Journal: :Nano Research 2023

The graphic abstracts have been mismatched for this two articles during production by vendor, and should appeared as below.

2007
Tsipi Heart

This paper defines and empirically tests a new concept of general trust in the remote-hosting (RH) vendor community. In the absence of prior experience or familiarity with RH vendors, and because third-party guarantees do not yet exist to assure expected results, previous trust mechanisms are inapplicable. Therefore, based on the Transaction Cost Economy theory and on the broad trust-related bo...

2010
Alfredo Rial Bart Preneel

Priced oblivious transfer (POT) is a two-party protocol between a vendor and a buyer in which the buyer purchases digital goods without the vendor learning what is bought. Although privacy properties are guaranteed, current schemes do not offer fair exchange. A malicious vendor can, e.g., prevent the buyer from retrieving the goods after receiving the payment, and a malicious buyer can also acc...

Journal: :JSEA 2011
Sami ul Haq Mushtaq Raza Asraf Zia Muhammed Naeem Ahmed Khan

A number of companies have employed Global Software Development (GSD) methodology as a useful tool for their software development practices. GSD is a contractual relationship between client and vendor organizations in which a client outsources all or some part of its software development activities to a vendor. The vendor in return provides the agreed services in lieu of certain amount of remun...

2010
Assion Lawson-Body

There is a significant body of evidence that many information systems (IS) implementation projects end in success. Despite numerous IS implementation project successes, there has also been a plethora of failures. This paper examines the impact of vendor trust on customer relationship management (CRM) implementation process. Grounded in available literature on vendor trust and IS implementation ...

2015
Nikolaus Schmidt Christoph Rosenkranz

The outsourcing of information technology (IT) to external vendors promises lower delivery cost while attaining higher delivery quality. Despite these positive prospects, many information technology outsourcing (ITO) projects still fail, often due to an unsuccessful client-vendor relationship. Most research to date has focused on investigating this relationship from the clients’ perspective, ev...

2007
Mohammad S. Rahman Karthik Kannan Mohit Tawarmalani

Traditionally, the government has been the sole entity to enforce anti-piracy measures. Of late, software vendors are attempting to thwart piracy of their products by limiting the patch to only legal users. By doing so, the vendor can vertically differentiate the legal copy from the pirated copy since pirates suffer more from hacker activity. Such an action by the vendor has interesting implica...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید