Draft research proposal; 20 JAN 2013. Preliminary proposal for a 3 (max 4) year research project leading to a PhD. In preparation for the WION workshops on Advanced Purchasing Research and to be worked out in more detail as a PhD research proposal before MAY 2013. The research objective is to find out: How innovating SMEs can best use Industrial Property Rights (patents) within value chains with their (SME) suppliers and their (SME) customers, what are best practices and improvement areas, what is a suitable theoretical framework, how can enterprises, business researchers & practitioners benefit from applying this framework.
Private Labels have transformed from value purchases into powerful brands. This paper develops a framework based on the four strategic dimensions of brand breadth, positioning, segmentation, and relationship with the store brand that retailers can uniquely draw upon to organise their brand portfolios. It examines the case of German retailer Rewe that successfully organises its private label portfolio along these dimensions. This paper argues that maintaining multi-tiered and multi-segmented private label portfolios can be important tools for retailers enabling them to cover broader markets, fulfil current consumer needs, build brand equity, and strengthen customer loyalty.
In Germany, public transport organizations are mainly owned by public authorities. Procurement in Hamburg involves the buses and infrastructure instead of transport services. The procurement process for buses and infrastructure is performed by the transport companies. Such processes must meet German and European public regulations. Therefore, public tender and procurement procedures for buying buses by German Public Transport Operators (PTOs) can be more complex and lengthier than procurement by private PTOs in other countries. As a result, the public transport companies are not primarily driven by profitability, but also by obligations towards the public and political aims. Obligations can comprise to provide affordable, environmentallyfriendly transport services for the citizens. In Hamburg, the public authority incorporates obligations (requirements) for the e-buses in their tendering documents. In Utrecht, as well as most of the rest of the Netherlands, public transport is carried out by private companies, under an operating contract (concession) with a public transport authority. In Utrecht, this authority is the province of Utrecht. The e-buses are the operators’ private property and they are obliged to account to the province of Utrecht for their implementation of public transport. When the province of Utrecht procures the operation of public transport services by means of a European tendering process, private transport companies can offer a bid for this tender. Both, the authority and operators, want to provide good public transport for their customers, but they both have different goals. The operators want to earn a reasonable profit margin on public transport, while the authority wants to fulfil certain public policy goals. The tendering process is where these two come together. It is a strong mechanism to get the best ‘value for money’ out of the market – for example, the most public transport, or the highest number of e-buses running in the area, within the available budget of the public transport authority.
Huzzy is een vrouwelijk georiënteerd condoommerk dat staat voor gelijkheid en diversiteit. Om de ideale omstandigheden te creëren voor een zo aangenaam mogelijke seksuele ervaring, streeft Huzzy naar het verbeteren van het welzijn van de vrouw door het verspreiden van een positieve boodschap waarbij assertiviteit en controle een centraal concept vormen, zowel voor, tijdens en na het hebben van seks.
Over the past decade, the trend in both the public sector and industry has been to outsource ICT to the cloud. While cost savings are often used as a rationale for outsourcing, another argument that is frequently used is that the cloud improves security. The reasoning behind this is twofold. First, cloud service providers are typically thought to have skilled staff trained in good security practices. Second, cloud providers often have a vastly distributed, highly connected network infrastructure, making them more resilient in the face of outages and denial-of-service attacks. Yet many examples of cloud outages, often due to attacks, call into question whether outsourcing to the cloud does improve security. In this project our goal therefore is to answer two questions: 1) did the cloud make use more secure?and 2) can we provide specific security guidance to support cloud outsourcing strategies? We will approach these questions in a multi-disciplinary fashion from a technical angle and from a business and management perspective. On the technical side, the project will focus on providing comprehensive insight into the attack surface at the network level of cloud providers and their users. We will use a measurement-based approach, leveraging large scale datasets about the Internet, both our own data (e.g. OpenINTEL, a large- scale dataset of active DNS measurements) and datasets from our long-term collaborators, such as CAIDA in the US (BGPStream, Network Telescope) and Saarland University in Germany (AmpPot). We will use this data to study the network infrastructure outside and within cloud environments to structurally map vulnerabilities to attacks as well as to identify security anti-patterns, where the way cloud services are managed or used introduce a weak point that attackers can target. From a business point of view, we will investigate outsourcing strategies for both the cloud providers and their customers. For guaranteeing 100% availability, cloud service providers have to maintain additional capacity at all times. They also need to forecast capacity requirements continuously for financially profitable decisions. If the forecast is lower than the capacity needed, then the cloud is not able to deliver 100% availability in case of an attack. Conversely, if the forecast is substantially higher, the cloud service provider might not be able to make desired profits. We therefore propose to assess the risk profiles of cloud providers (how likely it is a cloud provider is under attack at a given time given the nature of its customers) using available attack data to improve the provider resilience to future attacks. From the costumer perspective, we will investigate how we can support cloud outsourcing by taking into consideration business and technical constraints. Decision to choose a cloud service provider is typically based on multiple criteria depending upon the company’s needs (security and operational). We will develop decision support systems that will help in mapping companies’ needs to cloud service providers’ offers.