This dissertation increases our insight into the role of the service employee’s intercultural competences in the service to culturally diverse customers. Investigating the effect of the intercultural competences of service employees is of major importance because, as a consequence of globalization, the number of intercultural service encounters has increased dramatically and still does. The delivery of service to a culturally diverse customer-base requires a combination of knowledge, skills and attitude; the intercultural competences (also known as Global Mindset). In this study the hotel sector has been investigated specifically. The hotel sector is an important economic player that continues to grow inspite of economic downturn. The special characteristics of hotel services make the sector also very suitable for the research of face-to-face encounters in an international context. In this dissertation, a holistic approach has been chosen, meaning that in the four empirical studies not only the perspective of the manager, but also that of the employee and the customer was investigated. All three of the above-mentioned are actors in intercultural service according to the argumentation of the ‘service-profit chain’ (Heskett, Jones, et al., 1994). Together, the manager, employee and the customer form the so-called ‘service triangle’ (Bitner, 1990).
Businesses that can develop an appropriate response to the turbulence created by change and diversified customer expectations retain their sustainable competitive advantage. Especially with Covid19, Digital Transformation has emerged as an important element of pressure and necessity on the competitive advantage of businesses. Digital transformation refers to a radical change process from the way of doing business in the industry and the market to the nature of the interaction with internal and external customers. Digital transformation allows for meeting new expectations with new business processes and customer experiences with the opportunities offered by digital technologies. Although Digital transformation offers important competencies for businesses, it seems that SMEs, especially as important actors in the economy, lag behind large enterprises in the digital transformation process. This situation necessitates a detailed consideration of SMEs in the digital transformation process. This study aims to examine Digital Transformation in SMEs in detail. To achieve this, studies investigating digital transformation in SMEs and presenting empirical results were identified from various indexes (Ulakbim, Scopus, Web of Science, and Proquest). The studies were classified according to "author," "date of publication," "type of research," "sample," and "variables." The empirical evidence regarding the digital transformation process of SMEs is presented. The findings of the study are expected to contribute to the literature by presenting empirical studies on Digital Transformation in SMEs comprehensively. Additionally, it will increase awareness of the findings regarding the digital transformation process of SMEs, which are important actors in the economy.
MULTIFILE
Copyright enforcement by private third parties – does it work uniformly across the EU? Since the inception of Napster, home copying of digital files has taken a flight. The first providers of software or infrastructure for the illegal exchange of files were held contributory or vicariously liable for copyright infringement. In response, they quickly diluted the chain of liability to such an extent that neither the software producers, nor the service providers could be held liable. Moving further down the communication chain, the rights holders are now requiring Internet Service Providers (ISPs) that provide access to end customers to help them with the enforcement of their rights. This article discusses case-law regarding the enforcement of copyright by Internet Access Providers throughout Europe. At first glance, copyright enforcement has been harmonised by means of a number of directives, and article 8(3) of the Copyright Directive (2001/29/EC) regulates that EU Member States must ensure the position of rights holders with regard to injunctions against ISPs. Problem solved? Case law from Denmark, Ireland, Belgium, Norway, England, The Netherlands, Austria and the Court of Justice of the EU was studied. In addition, the legal practice in Germany was examined. The period of time covered by case law is from 2003 to 2013, the case law gives insight into the differences that still exist after the implementation of the directive.
Huzzy is een vrouwelijk georiënteerd condoommerk dat staat voor gelijkheid en diversiteit. Om de ideale omstandigheden te creëren voor een zo aangenaam mogelijke seksuele ervaring, streeft Huzzy naar het verbeteren van het welzijn van de vrouw door het verspreiden van een positieve boodschap waarbij assertiviteit en controle een centraal concept vormen, zowel voor, tijdens en na het hebben van seks.
Over the past decade, the trend in both the public sector and industry has been to outsource ICT to the cloud. While cost savings are often used as a rationale for outsourcing, another argument that is frequently used is that the cloud improves security. The reasoning behind this is twofold. First, cloud service providers are typically thought to have skilled staff trained in good security practices. Second, cloud providers often have a vastly distributed, highly connected network infrastructure, making them more resilient in the face of outages and denial-of-service attacks. Yet many examples of cloud outages, often due to attacks, call into question whether outsourcing to the cloud does improve security. In this project our goal therefore is to answer two questions: 1) did the cloud make use more secure?and 2) can we provide specific security guidance to support cloud outsourcing strategies? We will approach these questions in a multi-disciplinary fashion from a technical angle and from a business and management perspective. On the technical side, the project will focus on providing comprehensive insight into the attack surface at the network level of cloud providers and their users. We will use a measurement-based approach, leveraging large scale datasets about the Internet, both our own data (e.g. OpenINTEL, a large- scale dataset of active DNS measurements) and datasets from our long-term collaborators, such as CAIDA in the US (BGPStream, Network Telescope) and Saarland University in Germany (AmpPot). We will use this data to study the network infrastructure outside and within cloud environments to structurally map vulnerabilities to attacks as well as to identify security anti-patterns, where the way cloud services are managed or used introduce a weak point that attackers can target. From a business point of view, we will investigate outsourcing strategies for both the cloud providers and their customers. For guaranteeing 100% availability, cloud service providers have to maintain additional capacity at all times. They also need to forecast capacity requirements continuously for financially profitable decisions. If the forecast is lower than the capacity needed, then the cloud is not able to deliver 100% availability in case of an attack. Conversely, if the forecast is substantially higher, the cloud service provider might not be able to make desired profits. We therefore propose to assess the risk profiles of cloud providers (how likely it is a cloud provider is under attack at a given time given the nature of its customers) using available attack data to improve the provider resilience to future attacks. From the costumer perspective, we will investigate how we can support cloud outsourcing by taking into consideration business and technical constraints. Decision to choose a cloud service provider is typically based on multiple criteria depending upon the company’s needs (security and operational). We will develop decision support systems that will help in mapping companies’ needs to cloud service providers’ offers.