نتایج جستجو برای: vendor
تعداد نتایج: 8178 فیلتر نتایج به سال:
Producers frequently provide retailers with financial incentives to secure distribution of their products. These payments often take the form of vendor allowances: lumpsum transfers to retailers that do not directly depend on quantity sold. I study the equilibrium effects of the use of vendor allowances when retailers’ product selections are endogenous. I find that these payments are important ...
An effective supply chain management practice improves the profitability and responsiveness of organizations. Like multinationals, small-scale enterprises are also capitalizing this feat. This paper presents a case study of a two level supply chain setting. Here a small enterprise i.e. vendor manages the inventory of the retailer. Vendor develops the forecasts and a database for replenishment d...
Controlling IS offshoring projects is a great challenge because of the inherent uncertainty of such projects. In such settings, informal controls are assumed to become increasingly effective. However, still little is known about the factors that influence the effectiveness of informal controls. We argue that the vendor manager’s power distance orientation—a key cultural construct that reflects ...
The graphic abstracts have been mismatched for this two articles during production by vendor, and should appeared as below.
This paper defines and empirically tests a new concept of general trust in the remote-hosting (RH) vendor community. In the absence of prior experience or familiarity with RH vendors, and because third-party guarantees do not yet exist to assure expected results, previous trust mechanisms are inapplicable. Therefore, based on the Transaction Cost Economy theory and on the broad trust-related bo...
Priced oblivious transfer (POT) is a two-party protocol between a vendor and a buyer in which the buyer purchases digital goods without the vendor learning what is bought. Although privacy properties are guaranteed, current schemes do not offer fair exchange. A malicious vendor can, e.g., prevent the buyer from retrieving the goods after receiving the payment, and a malicious buyer can also acc...
A number of companies have employed Global Software Development (GSD) methodology as a useful tool for their software development practices. GSD is a contractual relationship between client and vendor organizations in which a client outsources all or some part of its software development activities to a vendor. The vendor in return provides the agreed services in lieu of certain amount of remun...
There is a significant body of evidence that many information systems (IS) implementation projects end in success. Despite numerous IS implementation project successes, there has also been a plethora of failures. This paper examines the impact of vendor trust on customer relationship management (CRM) implementation process. Grounded in available literature on vendor trust and IS implementation ...
The outsourcing of information technology (IT) to external vendors promises lower delivery cost while attaining higher delivery quality. Despite these positive prospects, many information technology outsourcing (ITO) projects still fail, often due to an unsuccessful client-vendor relationship. Most research to date has focused on investigating this relationship from the clients’ perspective, ev...
Traditionally, the government has been the sole entity to enforce anti-piracy measures. Of late, software vendors are attempting to thwart piracy of their products by limiting the patch to only legal users. By doing so, the vendor can vertically differentiate the legal copy from the pirated copy since pirates suffer more from hacker activity. Such an action by the vendor has interesting implica...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید