Das German Internet Panel (GIP) ist ein Infrastrukturprojekt. Das GIP dient der Erhebung von Daten über individuelle Einstellungen und Präferenzen, die für politische und ökonomische Entscheidungsprozesse relevant sind.
Der Fragebogen enthält zahlreiche experimentelle Variationen in den Erhebungsinstrumenten. Weitere Informationen finden Sie in der Studiendokumentation.
Themen: Sozialer Status: Oben-unten-Selbsteinschätzung auf einer Skala Leiter/ Pyramide (Experiment); Smartphone-Nutzung: Besitz von Mobiltelefon, Computer oder Laptop und Tablet Computer; Smartphone als Mobiltelefon; Smartphone Typ; genutzte Geräte für den Internetzugang; Social Media: Nutzung ausgewählter Anwendungen (z.B. Facebook, Instagram, etc.) im Internet oder als mobile App; Alleinnutzung des Smartphones oder teilen mit anderer Person; Personen, mit denen das Smartphone geteilt wird (Ehe)Partner, Kinder, andere Familienmitglieder, Freunde, Arbeitskollegen, andere); Verwendungshäufigkeit des Smartphones neben Telefonieren oder Versenden von SMS; Selbsteinschätzung der Fähigkeiten im Umgang mit dem Smartphone (Anfänger oder Fortgeschrittener); Angabe der Stundenzahl, die das Smartphone typischerweise eingeschaltet ist; Mitnahme des Smartphones außer Haus; Tragen des Smartphones unterwegs in der Hosentasche oder am Gürtel/ in einem Halter am Körper, in der Jacken- oder Westentasche, in einer Handtasche, einem Rucksack oder einer anderen Tasche, in der Hand; Orte bzw. Situationen außer Haus, wo der Befragte das Smartphone nicht direkt bei sich hat (in der Kirche bzw. in der Moschee, Synagoge oder einem anderen Gotteshaus, im Theater, Konzert, Kino und bei anderen kulturellen Veranstaltungen, in der Schule, Universität und anderen Bildungseinrichtungen, am Arbeitsplatz, beim Laufen oder im Fitnessstudio, bei anderen Sportarten (z.B. Teamsportarten), bei sehr kurzen Wegen (zum Einkaufen, etc.), anderer Ort/ andere Situation, Smartphone immer dabei); Einstellung des Smartphones in der Nacht (komplett ausgeschaltet, lautlos/ stumm/ bitte nicht stören/ Flugmodus, Smartphone bleibt eingeschaltet); Aufbewahrungsort des Smartphones in der Nacht (im Bett, in Reichweite neben dem Bett, im selben Raum nicht in direkter Reichweite, in einem anderen Raum); Aufbewahrungsort des Smartphones tagsüber zu Hause (Hosentasche oder am Gürtel, nicht am Körper, aber in Reichweite und Mitnahme bei Raumwechsel, an einem fixen Platz in der Wohnung, an einem anderen Ort).
Experiment zur Aufmerksamkeit des Befragten (Attention check): Abstimmungsverhalten bei einem Referendum über die Mitgliedschaft Deutschlands in der EU (Sonntagsfrage), wobei ein Teil der Befragten aufgefordert wurde, das Gesellschaft im Wandel-Logo anzuklicken und die Textlänge variiert wurde.
Lobbyismus: Geschätzter Einfluss von Lobbyismus auf die Klimapolitik der EU; Bewertung des Einflusses von Lobbyismus auf die Klimapolitik der EU; Einfluss von Lobbyismus auf das Maß an Klimaschutz der Europäischen Union.
Klimaschutz: Beeinflussbarkeit des Klimas auf der Erde durch die Menschheit; Zustimmung zur Aussage: weltweites Maß an Klimaschutz ist ausreichend, um die Erwärmung des Klimas einzuschränken und gravierende Auswirkungen zu verhindern; Meinung zur fairen Verteilung des Aufwands für den Klimaschutz auf die gesellschaftlichen Akteure in der EU; Zustimmung zur verschiedenen Aussagen: die meisten Bürger der EU tragen zum Klimaschutz bei, finanzielle Unterstützung von Klimaschutz- und Umweltorganisationen ist effektiv um den Klimaschutz voranzutreiben; wöchentliche Autonutzung (als Fahrer oder Mitfahrer); Häufigkeit folgender Tätigkeiten in den letzten 6 Monaten (beim Kauf eines Produkts auf dessen Nachhaltigkeit geachtet, ehrenamtliches Engagement für ein Umweltprojekt, Teilnahme an einer Demonstration für mehr Umweltschutz bzw. Klimaschutz, eigene Einkaufstasche beim Einkaufen, Petition für mehr Umweltschutz bzw. Klimaschutz unterschrieben, Spende an eine Umweltorganisation, Kauf regionaler Bioprodukte, mit dem Flugzeug geflogen, keine der Tätigkeiten); der Gerichtshof der Europäischen Union (EuGH) begünstigt Maßnahmen, die die Europäische Einigung vorantreiben vs. schützt Parteien oder Gruppen, die gegen die Europäische Einigung sind; Zustimmung zur Aussage: wenn der EuGH viele Entscheidungen treffen würde, mit denen die meisten Leute nicht übereinstimmen, wäre es besser, den EuGH ganz abzuschaffen; Meinung zur Rechtsstaatlichkeit (manchmal ist es besser das Gesetz zu ignorieren und Probleme sofort zu lösen, statt auf eine rechtliche Lösung zu warten); Zustimmung zur Aussage: es ist sehr wichtig, den Ausstoß von Kohlendioxid und Schadstoffen durch Fahrzeuge zu mindern, auch auf Kosten des Wirtschaftswachstums; Bereitschaft, heute etwas Nützliches aufzugeben, um dafür mehr davon in der Zukunft zu profitieren.
Experiment zu EU-Entscheidungen hinsichtlich einer Gesetzesreform zur Bewältigung der Luftverschmutzung mit unterschiedlichen Szenarien in Bezug auf die Umsetzung von EU-Recht in nationales Recht und die Einleitung rechtlicher Schritte gegen Deutschland durch die EU-Kommission bei fehlender Umsetzung von EU-Recht in nationales Recht.
Zufriedenheit mit der Art, wie die Bundesregierung bzw. die EU diese Situation handhabt; Verständnis des gelesenen Hergangs durch Auswahl zutreffender Antworten (die Kommission kann rechtliche Schritte gegen einen EU-Staat einleiten, der es versäumt EU-Recht umzusetzen, die deutsche Bundesregierung wird einen Gesetzesentwurf einbringen, der die jetzige Immigrationspolitik/ Politik zur Luftverschmutzung reformiert).
Parteien-Experiment: Sympathie-Skalometer für die derzeitigen, namentlich unter einem Foto genannten Parteivorsitzenden der Parteien (CDU: Annegret Kramp-Karrenbauer, CSU: Markus Söder, SPD: Saskia Esken, Norbert Walter-Borjans, FDP: Christian Lindner, Bündnis90/ Die Grünen: Robert Habeck, Annalena Baerbock, Die Linke: Katja Kipping, Bernd Riexinger, AfD: Jörg Meuthen); Problemlösungskompetenz der Parteien CDU, CSU, SPD, FDP, Bündnis90/ Die Grünen, Die Linke und AfD; Einfluss der vorgenannten Parteien auf den Gesetzgebungsprozess seit der letzten Bundestagswahl; Links-Rechts-Einstufung der vorgenannten Parteien (11-stufige Skala); Wahrnehmung der Parteien CDU, CSU, SPD, FDP, Bünnis90/ Die Grünen, Die Linke und AfD als zerstritten versus geschlossen (11-stufige Skala); Wahrnehmung der Aussagen der vorgenannten Parteien zu angestrebten politischen Maßnahmen als vage versus genau (11-stufige Skala); Wahrscheinlichkeit, jemals die Partei CDU, CSU, SPD, FDP, Bündnis90/ Die Grünen, Die Linke und AfD zu wählen (11-stufige Skala); Kenntnis der derzeitigen Parteivorsitzenden der Parteien CDU, CSU, SPD, FDP, Bündnis90/ Die Grünen, Die Linke und AfD; Parteipräferenz bei der nächsten Bundestagswahl (Sonntagsfrage).
Demographie: Geschlecht; Alter (Geburtsjahr, kategorisiert); höchster Schulabschluss; höchster beruflicher Bildungsabschluss; Familienstand; Haushaltsgröße; Erwerbsstatus; deutsche Staatsbürgerschaft; Häufigkeit der privaten Internetnutzung; Bundesland.
Zusätzlich verkodet wurde: Befragten- ID; Haushalts-ID, GIP; Personen-ID (innerhalb des Haushalts); Jahr der Rekrutierung (2012, 2014, 2018); Interviewdatum; derzeitiger Online-Status; Zuordnung zu Experimentalgruppen; Randomisierungen; Gesellschaft im Wandel-Logo wurde angeklickt.
Fragebogenevaluation (interessant, abwechslungsreich, relevant, lang, schwierig, zu persönlich); Beurteilung der Befragung insgesamt; Befragter hat weitere Anmerkungen zum Fragebogen gemacht.
THE DYING PILLOW (aka SMOOTHING THE PILLOW OF DYING RACE) For 12 cymbals (four - twelve players), composed 2015. Duration variable. Commissioned by Synergy Percussion as part of the 40 x 40 project. PROGRAM NOTE To quell the violence on the frontiers of early Australia, to reduce devastation by disease and to provide Aborigines with a 'humane' environment while their race died out, colonial governments introduced systems of 'protective' legislation. The first was in 1860 in South Australia, where a Chief Protector was appointed to watch over the interests of Aboriginal people and to 'smooth the pillow of dying race'. Similar legislation was passed in Victoria (1869), Queensland (1897), Western Australia (1905) and New South Wales (1909). These laws were a way of 'protecting' Aborigines from violence on the frontier. By designating territory for Aborigines, it was hoped that the conflict between settlers and Aborigines over land would stop and that Aborigines would use the settlement land to farm and become self-sufficient, thus improving their 'destitute' state and reducing their reliance on the government for rations. This piece was inspired by a recent evidencing of increasing racism in Australia, and features text in the background which has been taken from documents in the National Library of Australia. The title is a play on the original news article headline above, pointing to a more positive future where the 'pillow' is not required. A digital or hard copy of the score is available from Material Press. INSTRUCTIONS This score should be read in the Decibel Scoreplayer (see below). You have the option in the Application to change the speed, Performer instructions for the piece are in the score file when you open it on the iPad. Each player is assigned a colour. A smooth flat line indicates a soft dynamic, and the widening of the line means getting louder. Use a bow to play the cymbal and try as where possible to make the bow change inaudible. A 'dot' at the end or start of a line means to articulate the start or end in some strong way, if there is no dot you should ease in at the start and let the cymbal ring out at the end. Floating 'dots' are soft cymbal strikes that can ring out (i.e.do not require dampening). These can be on the cymbals being bowed, or on others - which could be crotales or any other type of 'cymbal like' instrument. NOTE TO PERFORMERS The majority of my compositions use scores that are read on an iPad tablet computer, using the Decibel ScorePlayer , an application available on the App Store . Any fixed media is embedded in the score, and some feature automated functions. In the case of ensemble works, multiple iPads can be networked on a LAN or over the Internet so parts can be read in a synchronised way. You should upload the score file (ending with.dsz) to your iPad from your computer via AirDrop on an Apple, or cable from a PC. Instructions on how to do this and using the Decibel ScorePlayer , more generally are included in the Application, which ships with five other scores. Thus my works have different versions of the score, as you may see above. A PDF/PNG file of the score 'image', a DSZ file to upload onto the iPad for performance, and for some less complex scores, a video version. Hardcopies are also available from my publisher. You can find out more about the Decibel ScorePlayer , and how to make your own scores for it, here. PERFORMANCES Syzergy Percussion, online project with video by Sam James, 2016, 1'20" version. Yarnwire, StonyBrook University, 2019, 8'30" version. MATERIALS ATTACHED DecibelScorePlayer file, score image, instructions. Below are three video resources: the score as video, a live performance, and the original video for the Synergy Percussion project.
Das Verbundforschungsprojekt Sicherheit im Öffentlichen Raum (SIRA) befasste sich in seinem politwissenschaftlichen Teil europäisch-vergleichend mit dem Einfluss institutioneller Regimes auf die Billigung sicherheitspolitischer Maßnahmen.
Hierfür analysierte das Projekt das Politikfeld Innere Sicherheit. Im Mittelpunkt stand die sog. Vorratsdatenspeicherung (Mindestspeicherfrist), die in den Staaten der Europäischen Union parallel diskutiert wurde und wird. Bei der quantitativen Befragung wurden zudem die Bereiche Flughafen und CCTV berücksichtigt.
Das Vereinigte Königreich und Deutschland dienten als Beispiele für unterschiedliche politische und institutionelle Regimes. Es wurde darauf aufbauend der Einfluss des landesspezifischen Institutionengefüges auf die Beurteilung von sicherheitspolitischen Maßnahmen durch die Bevölkerung empirisch überprüft. Der vorliegende (deutsche) Datensatz umfasst die Interviews des Pretests und der Feldphase.
Vertrauen in Politik, politische Institutionen, Gerichte und Sicherheitsinstitutionen. Nutzungsverhalten Internet und Sicherheitsempfinden allgemein und im Internet. Wahrnehmung und Bewertung von Sicherheitsmaßnahmen und Vorratsdatenspeicherung. Einstellung zu Maßnahmen im Flugverkehr und der Videoüberwachung sowie zum Datenaustausch zwischen Sicherheitsbehörden. Politische Einstellungen, Wahlverhalten.
1. Vertrauen in Politik, politische Institutionen, Gerichte und Sicherheitsinstitutionen: Vertrauen in Landespolizei, Bundespolizei, Verfassungsschutz, Bundeswehr und private Sicherheitsunternehmen; Kontakt mit Sicherheitsbehörden in den letzten 12 Monaten; Angabe der Sicherheitsbehörde (Landespolizei, Bundespolizei, Verfassungsschutz, Bundeswehr, andere, sonstige offene Angabe); Zufriedenheit mit der Behandlung durch die Sicherheitsbehörden; Kontakt mit privaten Sicherheitsunternehmen in den letzten 12 Monaten; Zufriedenheit mit der Behandlung durch private Sicherheitsunternehmen; Vertrauen in Gerichte allgemein, das Bundesverfassungsgericht und den europäischen Gerichtshof; Kontakt mit Gericht in letzten 2 Jahren; Zufriedenheit mit der Behandlung durch das Gericht; Vertrauen in Politik: Kommunalpolitik, Bezirkspolitik, Landespolitik, Bundespolitik, europäische Politik.
2. Nutzungsverhalten Internet und Sicherheitsempfinden allgemein und im Internet, Bewertung von Sicherheitsmaßnahmen: Häufigkeit der Internetnutzung für private Zwecke; Nutzung von Internetbanking; Gründe gegen die Nutzung von Internetbanking (unbekannt, zu kompliziert, kein Interesse, Bedenken hinsichtlich der Datensicherheit); Nutzung von Internet Shopping; Gründe gegen die Nutzung von Internet Shopping (unbekannt, zu kompliziert, kein Interesse, Bedenken hinsichtlich der Datensicherheit); Nutzung von Sozialen Medien im Internet; Gründe gegen die Internetnutzung für Soziale Medien (unbekannt, zu kompliziert, kein Interesse, Bedenken hinsichtlich der Datensicherheit).
Wahrnehmung und Bewertung von Sicherheitsmaßnahmen und Vorratsdatenspeicherung: Bekanntheit von Internetsperren; Bewertung von Internetsperren; Bekanntheit der Vorratsdatenspeicherung; Bewertung der Vorratsdatenspeicherung; Sicherheitsgefühl durch die Vorratsdatenspeicherung; Vertrauen in Kommunikationsunternehmen im Hinblick auf die Sicherheit persönlicher Daten; Vertrauen in Behörden im Hinblick auf die Sicherheit persönlicher Daten; Gefühl von Kontrollverlust durch die Vorratsdatenspeicherung; Gefühl ungerechtfertigter Verdächtigung durch den Staat durch die Vorratsdatenspeicherung; Verhaltensänderung am Telefon oder im Internet durch die Vorratsdatenspeicherung; Bewertung der Vorratsdatenspeicherung; Nutzung aktueller Antiviren-Programme.
Kriminalitätsfurcht hinsichtlich Internetstraftaten: Wahrscheinlichkeit eigener Betroffenheit von Internetkriminalität; Schutz vor Internetkriminalität ist möglich; Schutzpflicht des Staates, des einzelnen Internetnutzers und von Internetanbietern; eigene Betroffenheit von Internetkriminalität bzw. im sozialen Umfeld; Selbständigkeit bei der Internetnutzung; Vertrauen in Unternehmen (online) im Hinblick auf den Umgang mit persönlichen Daten; Verhalten im Internet: privater oder öffentlicher Raum.
Persönliches Sicherheitsempfinden (man kann nicht sicher genug gehen versus es kommt wie es kommt); eigene Absicherung mit Zusatzversicherungen; persönliche Gründe gegen Zusatzversicherungen (unnötig, zu teuer, sonstiges, offene Angabe); Wahrscheinlichkeit eines Einbruchs zuhause; Schutzmaßnahmen gegen Einbrüche; Sicherheitsgefühl nachts allein in der Wohngegend.
3. Einstellung zu Maßnahmen im Flugverkehr und der Videoüberwachung sowie zum Datenaustausch zwischen Behörden: Häufigkeit des Fliegens pro Jahr; persönliche Gründe gegen das Fliegen (Flugangst, Ziel mit anderen Transportmitteln erreichbar, keine Reisetätigkeit, Probleme mit den Sicherheitsmaßnahmen, Angst vor terroristischen Anschlägen, sonstiges, offene Angabe); Fliegen: Angst vor Straftat und vor einem terroristischen Anschlag; Wahrscheinlichkeit eigener Betroffenheit von einer Straftat und von einem terroristischen Anschlag in den nächsten 12 Monaten; Zweckmäßigkeit der Sicherheitsmaßnahmen am Flughafen zur Abwehr von Straftaten und zur Abwehr terroristischer Anschläge; Störfaktoren bei den Sicherheitskontrollen am Flughafen (störend, zeitraubend, nachlässige Durchführung, übertrieben, Verletzung der Privatsphäre, Flüssigkeitsregelungen stören, sonstiges, offene Angabe); Verzicht auf das Fliegen wegen Sicherheitsmaßnahmen; Bereitschaft zur Preisgabe personenbezogener Daten zur Beschleunigung der Sicherheitsmaßen.
Wahrnehmung von Videoüberwachung: Sicherheitsgefühl durch Überwachungskamerasysteme (CCTV Closed Circuit Television) am Flughafen, in der U-Bahn, am Bahnhof und auf öffentlichen Plätzen; Zweckmäßigkeit von Videoüberwachung an Bahnhöfen und in U-Bahnen zur Abwehr von Straftaten und von terroristischen Anschlägen; Überwachungskamerabild auf Handy anzeigen lassen.
Erfassung von Passagierdaten von allen Flug- und Schiffsreisenden (PNR): Bekanntheit der Erfassung von Passagierdaten und Bewertung dieser Maßnahme; Sicherheitsgefühl durch die Erfassung von Passagierdaten; Vertrauen in Verkehrsunternehmen und Behörden im Umgang mit persönlichen Ausweis- und Passagierdaten; Gefühl von Kontrollverlust hinsichtlich der Preisgabe von Reisedaten; Gefühl ungerechtfertigter Verdächtigung durch den Staat; Bewertung der Erfassung persönlicher Reisedaten.
Einstellung zum Datenaustausch zwischen Sicherheitsbehörden: Bewertung des Datenaustauschs zwischen Polizei, Verfassungsschutz und Geheimdienst; Bewertung des Datenaustauschs zwischen europäischen Mitgliedsstaaten; Bewertung des Datenaustauschs mit außereuropäischen Staaten.
4. Politische Einstellungen, Wahlverhalten: Deutsche Staatsangehörigkeit; andere EU-Staatsangehörigkeit; Wahrscheinlichkeit der Wahlteilnahme (Deutsche, EU-Bürger/-in, Nicht EU-Bürger/-in); Wahlverhalten bei bisherigen Wahlen (Stammwähler, Wechselwähler); Parteineigung bei bisherigen Wahlen und Parteiidentifikation; Bedeutung der Forderungen einer Partei zur Inneren Sicherheit für die persönliche Wahlentscheidung (Deutsche, EU-Bürger/-in, Nicht EU-Bürger/-in); Wahlentscheidung gegen eine Partei wegen ihrer Forderungen zur Inneren Sicherheit; Grund für Wahlentscheidung gegen Partei (Forderungen zur Inneren Sicherheit gingen nicht weit genug versus zu weit, sonstiger Grund: offene Angabe); Politikinteresse.
Demographie: Geschlecht; Geburtsjahr; Geburtsmonat; Alter (gruppiert); Einordnung der Wohngegend (Urbanisierungsgrad); Familienstand; feste Partnerschaft; gemeinsamer Haushalt mit dem Partner; Kinder; Anzahl Personen im Haushalt (Haushaltsgröße); Anzahl der Festnetznummern; Anzahl der Handynummern; höchster Schulabschluss; angestrebter höchster Schulabschluss; höchster Ausbildungs-/Hochschulabschluss; Erwerbstätigkeit bzw. derzeitige Tätigkeit; Geburt in Deutschland; Geburt der Eltern in Deutschland; länger als 6 Monate außerhalb Deutschlands gelebt; Land des Auslandsaufenthalts (Griechenland, Italien, Ex-Jugoslawien, Polen, Türkei, Indien, Pakistan, Frankreich, Spanien, UK, anderes Land); Religionsgemeinschaft; Stärke der Religiosität; Haushaltsnettoeinkommen.
Zusätzlich verkodet wurde: Projektname (SIRA); Befragten-ID; Pretest Interview, Mobilfunknummernstichprobe; Bundesland des Hauptwohnsitzes; Sprachprobleme bzw. Verständnisschwierigkeiten; Antwortbereitschaft des Befragten; Zuverlässigkeit der Angaben; Interviewer Feedback ja/nein; Interviewer Feedback offene Angabe; Interviewer -ID; Interviewdauer in Sekunden; Interviewdatum; Uhrzeit des Interviewbeginns; Anzahl der Kontaktversuche; Interview nach Unterbrechung fortgeführt; Gewichtungsfaktoren; Alterskategorien.
Das Verbundforschungsprojekt Sicherheit im Öffentlichen Raum (SIRA) befasste sich in seinem politwissenschaftlichen Teil europäisch-vergleichend mit dem Einfluss institutioneller Regimes auf die Billigung sicherheitspolitischer Maßnahmen.
Hierfür analysierte das Projekt das Politikfeld Innere Sicherheit. Im Mittelpunkt stand die sog. Vorratsdatenspeicherung (Mindestspeicherfrist), die in den Staaten der Europäischen Union parallel diskutiert wurde und wird. Bei der quantitativen Befragung wurden zudem die Bereiche Flughafen und CCTV berücksichtigt.
Das Vereinigte Königreich und Deutschland dienten als Beispiele für unterschiedliche politische und institutionelle Regimes. Es wurde darauf aufbauend der Einfluss des landesspezifischen Institutionengefüges auf die Beurteilung von sicherheitspolitischen Maßnahmen durch die Bevölkerung empirisch überprüft. Der vorliegende (deutsche) Datensatz umfasst die Interviews des Pretests und der Feldphase.
Vertrauen in Politik, politische Institutionen, Gerichte und Sicherheitsinstitutionen. Nutzungsverhalten Internet und Sicherheitsempfinden allgemein und im Internet. Wahrnehmung und Bewertung von Sicherheitsmaßnahmen und Vorratsdatenspeicherung. Einstellung zu Maßnahmen im Flugverkehr und der Videoüberwachung sowie zum Datenaustausch zwischen Sicherheitsbehörden. Politische Einstellungen, Wahlverhalten.
1. Vertrauen in Politik, politische Institutionen, Gerichte und Sicherheitsinstitutionen: Vertrauen in die Polizei, Government Communications Headquarters (GCHQ), den britischen Inlandsgeheimdienst MI5, Militär und private Sicherheitsunternehmen; Kontakt mit Sicherheitsbehörden in den letzten 12 Monaten; Angabe der Sicherheitsbehörde (Polizei, Government Communications Headquarters (GCHQ), britischer Inlandsgeheimdienst MI5, Militär, andere, sonstige offene Angabe); Zufriedenheit mit der Behandlung durch die Sicherheitsbehörden; Kontakt mit privaten Sicherheitsunternehmen in den letzten 12 Monaten; Zufriedenheit mit der Behandlung durch private Sicherheitsunternehmen; Vertrauen in Gerichte allgemein, den neuen UK Supreme Court und den europäischen Gerichtshof; Kontakt mit Gericht in letzten 2 Jahren; Zufriedenheit mit der Behandlung durch das Gericht; Vertrauen in Politik: Kommunalpolitik, Bezirkspolitik, Landespolitik, EU-Politik.
2. Nutzungsverhalten Internet und Sicherheitsempfinden allgemein und im Internet, Bewertung von Sicherheitsmaßnahmen: Häufigkeit der Internetnutzung für private Zwecke; Nutzung von Internetbanking; Gründe gegen die Nutzung von Internetbanking (unbekannt, zu kompliziert, kein Interesse, Bedenken hinsichtlich der Datensicherheit); Nutzung von Internet Shopping; Gründe gegen die Nutzung von Internet Shopping (unbekannt, zu kompliziert, kein Interesse, Bedenken hinsichtlich der Datensicherheit); Nutzung von Sozialen Medien im Internet; Gründe gegen die Internetnutzung für Soziale Medien (unbekannt, zu kompliziert, kein Interesse, Bedenken hinsichtlich der Datensicherheit).
Wahrnehmung und Bewertung von Sicherheitsmaßnahmen und Vorratsdatenspeicherung: Bekanntheit von Internetsperren; Bewertung von Internetsperren; Bekanntheit der Vorratsdatenspeicherung; Bewertung der Vorratsdatenspeicherung; Sicherheitsgefühl durch die Vorratsdatenspeicherung; Vertrauen in Kommunikationsunternehmen im Hinblick auf die Sicherheit persönlicher Daten; Vertrauen in Behörden im Hinblick auf die Sicherheit persönlicher Daten; Gefühl von Kontrollverlust durch die Vorratsdatenspeicherung; Gefühl ungerechtfertigter Verdächtigung durch den Staat durch die Vorratsdatenspeicherung; Verhaltensänderung am Telefon oder im Internet durch die Vorratsdatenspeicherung; Bewertung der Vorratsdatenspeicherung; Nutzung aktueller Antiviren-Programme.
Kriminalitätsfurcht hinsichtlich Internetstraftaten: Wahrscheinlichkeit eigener Betroffenheit von Internetkriminalität; Schutz vor Internetkriminalität ist möglich; Schutzpflicht des Staates, des einzelnen Internetnutzers und von Internetanbietern; eigene Betroffenheit von Internetkriminalität bzw. im sozialen Umfeld; Selbständigkeit bei der Internetnutzung; Vertrauen in Unternehmen (online) im Hinblick auf den Umgang mit persönlichen Daten; Verhalten im Internet: privater oder öffentlicher Raum.
Persönliches Sicherheitsempfinden (man kann nicht sicher genug gehen versus es kommt wie es kommt); eigene Absicherung mit Zusatzversicherungen; persönliche Gründe gegen Zusatzversicherungen (unnötig, zu teuer, sonstiges, offene Angabe); Wahrscheinlichkeit eines Einbruchs zuhause; Schutzmaßnahmen gegen Einbrüche; Sicherheitsgefühl nachts allein in der Wohngegend.
3. Einstellung zu Maßnahmen im Flugverkehr und der Videoüberwachung sowie zum Datenaustausch zwischen Behörden: Häufigkeit des Fliegens pro Jahr; persönliche Gründe gegen das Fliegen (Flugangst, Ziel mit anderen Transportmitteln erreichbar, keine Reisetätigkeit, Probleme mit den Sicherheitsmaßnahmen, Angst vor terroristischen Anschlägen, Preis, sonstiges, offene Angabe); Fliegen: Angst vor Straftat und vor einem terroristischen Anschlag; Wahrscheinlichkeit eigener Betroffenheit von einer Straftat und von einem terroristischen Anschlag in den nächsten 12 Monaten; Zweckmäßigkeit der Sicherheitsmaßnahmen am Flughafen zur Abwehr von Straftaten und zur Abwehr terroristischer Anschläge; Störfaktoren bei den Sicherheitskontrollen am Flughafen (zeitraubend, nachlässige Durchführung, übertrieben, Verletzung der Privatsphäre, Flüssigkeitsregelungen stören, sonstiges, offene Angabe); Verzicht auf das Fliegen wegen Sicherheitsmaßnahmen; Bereitschaft zur Preisgabe personenbezogener Daten zur Beschleunigung der Sicherheitsmaßen.
Wahrnehmung von Videoüberwachung: Sicherheitsgefühl durch Überwachungskamerasysteme (CCTV Closed Circuit Television) am Flughafen, in der U-Bahn, am Bahnhof und auf öffentlichen Plätzen; Zweckmäßigkeit von Videoüberwachung an Bahnhöfen und in U-Bahnen zur Abwehr von Straftaten und von terroristischen Anschlägen; Überwachungskamerabild auf Handy anzeigen lassen.
Erfassung von Passagierdaten von allen Flug- und Schiffsreisenden (PNR): Bekanntheit der Erfassung von Passagierdaten und Bewertung dieser Maßnahme; Sicherheitsgefühl durch die Erfassung von Passagierdaten; Vertrauen in Verkehrsunternehmen und Behörden im Umgang mit persönlichen Ausweis- und Passagierdaten; Gefühl von Kontrollverlust hinsichtlich der Preisgabe von Reisedaten; Gefühl ungerechtfertigter Verdächtigung durch den Staat; Bewertung der Erfassung persönlicher Reisedaten.
Einstellung zum Datenaustausch zwischen Sicherheitsbehörden: Bewertung des Datenaustauschs zwischen britischen Sicherheitsbehörden; Bewertung des Datenaustauschs zwischen europäischen Mitgliedsstaaten; Bewertung des Datenaustauschs mit außereuropäischen Staaten.
4. Politische Einstellungen, Wahlverhalten: Britische Staatsangehörigkeit; andere EU-Staatsangehörigkeit; Wahrscheinlichkeit der Wahlteilnahme; Wahlverhalten bei bisherigen Wahlen (Stammwähler, Wechselwähler); Parteineigung bei bisherigen Wahlen und Parteiidentifikation; Bedeutung der Forderungen einer Partei zur Inneren Sicherheit für die persönliche Wahlentscheidung; Wahlentscheidung gegen eine Partei wegen ihrer Forderungen zur Inneren Sicherheit; Grund für Wahlentscheidung gegen Partei (Forderungen zur Inneren Sicherheit gingen nicht weit genug versus zu weit, sonstiger Grund: offene Angabe); Politikinteresse.
Demographie: Geschlecht; Alter (gruppiert); Einordnung der Wohngegend (Urbanisierungsgrad); Familienstand; feste Partnerschaft; gemeinsamer Haushalt mit dem Partner; Kinder; Anzahl Personen im Haushalt (Haushaltsgröße); Anzahl der Festnetznummern; Anzahl der Handynummern; höchster Schulabschluss; angestrebter höchster Schulabschluss; höchster Ausbildungs-/Hochschulabschluss; Erwerbstätigkeit bzw. derzeitige Tätigkeit; Geburt im Vereinigten Königreich; Geburt der Eltern im Vereinigten Königreich; länger als 6 Monate außerhalb des Vereinigten Königreichs gelebt; Land des Auslandsaufenthalts (Griechenland, Italien, Ex-Jugoslawien, Polen, Türkei, Indien, Pakistan, Frankreich, Spanien, Deutschland, USA, Australien, anderes Land); Religionsgemeinschaft; Stärke der Religiosität; Haushaltsnettoeinkommen; Migrationshintergrund.
Zusätzlich verkodet wurde: Befragten-ID; Land des Hauptwohnsitzes innerhalb des Vereinigten Königreichs; Alterskategorien.
A Network Analysis of Museums on Instagram -- Towards a Hybrid Minimax Recommender for Free-Roaming Museum Visits -- Developing a Multi-Channel Customer Relationship Management Strategy for Hotel Operation -- The Importance Attached to Culinary Blogs in the Promotion of Food Products with Health and Nutrition Claims-a Perspective of Polish Processors and Distributors -- Quality Service in the Hospitality Industry: Achieving Effective Service Processes and Designs -- Hospitality, Tourism, and Events Industry Competency Model: Human Resource Management Implications -- Temporary Museum Exhibitions as Tools for Cultural Innovation -- The Relationship between Service Quality and Customer Satisfaction on Luxurious Hotels so to Produce Error-Free Service -- The Use of Customer Relations Management's Digital Technologies from Greek Hotels -- The Sharing Economy and how it Affects the Conditions of Consumption and Competition in the Tourism Industry - The case of Airbnb in Greece -- Tourism and Destination Branding: the Case of Greek Islands -- Greek Culinary Tourism is Lost in Translation -- The Crucial Role of the Museums in Allying Alternative Forms of Diplomacy -- Digital Inbound Marketing: Particularities of Business-to-Business and Business-to-Customer Strategies -- Open-access Resource for the Management and Promotion of Greek Museums with Folk Exhibits -- Small Scale Event Product Analysis Based on Conjoint Analysis Results: The Case of Yedi Kule Conquest Monuments Run -- Art or Society with "εmotions": Manifestations of εmotions from Ancient Greece to Today -- Analysis of the Relationship between Transformational Leadership & Learning Organization in Health Care Services -- Ways to Find Employment and Preferences in Relation to a New Job for University Graduates of the Pilsen Region in the Czech Republic -- Entrepreneurial Intention Determinants Among Female Students. The Influence of Role Models, Parent Occupation and Perceived Behavioral Control on Forming the Desire to Become a Business Owner -- Satisfaction of Internal Customers in a Public University Hospital -- Facebook Content Strategies: A Case Study of a Subsidiary Company in Greece -- Examining Gaps in Business and Logistics Skills and their Performance Implications in the Agrifood Supply Chain in Greece -- Understanding Aviation Consumers' Experience at the Time of Their Journeys: the Use of the Denied Boarding Regulations (DBRs) at Chios Airport -- ICT-based Participatory Approaches for the Exploitation and Re-use of Intangible Cultural Heritage -- Business Students in Mexico Developing Work Skills with Work Integrated Learning -- Investigating the Adoption of Integrated Marketing Communication Strategies at Institutional Cultural Festivals in Greece. The Case Study of Aeschylia in Elefsina -- Using the Theory of Planned Behavior versus the Big Five Personality Trait Model in Predicting Entrepreneurial Intention. A Comparison Study of the Two Models -- Consumers' Attitudes Towards Advertisement in YouTube -- An Innovative Platform for Creating Audience-Specific Gamified Cultural Tourism Guides where Art, Tradition and Culture, Technology and Business Converge -- The Historic and Monumental Enhancement as a Tool for the Sustainable Development of Cultural Assets of Greece -- Internet Services and Social Networks in the Greek Academia -- The Effect of Asymmetrical Image Projections on Online Destination Branding -- The Aegina Pistachio as a Cultural Resource for the Development and Promotion of the Island -- The Cultural, Nutritional and the Socio-Economic Value of Messinian Olive Oil from Greece -- Enhancing Practice in Continuity with Innovative Thinking: The Primary Task of Higher Education -- Engaging New Museum Audience through Art Workshops: The Case of Adult Art at Macedonian Museum of Contemporary Art -- The Role of Social Relations in Fostering Entrepreneurship and Creative Use of SME Resources -- Traditional and Modern Forms of Synergies between Cultural and Tourism Sectors: Challenges and Opportunities for Greek Folk Festivities Promoting Traditional Products -- Health Management Issues from Related Quality of Life between Greek and Refugees Postpartum Women in Greece -- The Use of ICT in the Promotion of Arts and Cultural Heritage Education in Museums -- The Role of Destination Brand Image and Revisit Intention on Tourist Spending -- Creativity and Sustainable Development: A Proposal to Transform a Small Greek Island into a Creative Town -- Understanding the Challenges of the Healthcare System in Promoting Best Use of Digital Marketing Tools for a Purposeful Living -- Combining Traditional and Digital Tools in Developing an International Guerilla Marketing Strategy: The Case of a SME Greek Company -- The End of Marketing as You Know It. Or Not! -- Categorization of Ambient Media Based on Identification of Common Signs of Selected Installations -- The Dynamic Synergy in Communication and Tourism Development is Calling the City of Katerini, Greece -- Collaborative Problem Solving as a Critical Transversal Skill for the Transition from the School Environment to the Workplace -- Seeking for a Better Fitting: Understanding the Tour Operators for Cruises on Sao Miguel Island -- Impact of the Economic Crisis on Health Indicators in Greece and the Need for Primary Health Care Services -- Voters' Behavior: what Drives Political Consumption in Cyprus? An Analysis of the Behavior of Young Voters -- An Examination of Consumers' Attitudes Towards Genetically Modified-Food: The Greek Case -- App Store Optimization Factors for Effective Mobile App Ranking -- Websites and Facebook Profile Communication of Dentists in Oradea, Romania -- Institutional and Organizational Efforts to Establish Primary Health Care in Greece -- Actors in a Museum: Towards an Innovative Theatre Stage -- Online Imagined Communities in the Airline Industry -- Advances and Distinctions in the Use of Biometric Methods Versus Traditional Methods for Studying the Customer Experience -- The Effect of Airport Branding to Air Traffic and Passenger Movement: An Overview -- Do Social Media Affect Museums' Brand Equity? An Exploratory Qualitative Study -- The Sociological Approach to Greek Tourism in the Period of Economic Crisis -- Exploring the Factors Affecting Consumer Acceptance of Proximity M-Payment Services -- OneAppy: An Interactive Platform Providing Novel Marketing Channels and Promoting Product and Services to the Tourism Industry -- European Works Councils in the Hotel Industry -- Investigating the Social Media potential to attract customers in the banking services industry using Fuzzy Delphi and Analytic Hierarchy Process -- Greek Consumers' Awareness and Perceptions for Green Hotels and Green Furniture -- Exploring the Power of Certification Systems in the Development of Hiking Tourism in Greece: The Case of Menalon Trail from the Demand-Side -- Tourism, Design and Disability -- Analysing Projected Destination Images Versus Visitor-Generated Visual Content in Brasov, Transylvania -- The Dawn of GDPR: Implications for the Digital Business Landscape -- Strategic Synergies and Co-Marketing – A case study of the Airline Sector -- Cyprus's Wine Market: Influencing Factors of Consumer Behaviour as Part of Destination Marketing -- The Evolution of Demographic Changes in Greek Society and Proposed Administrative Management Model -- Reasons for Using Daily Deal Sites -- Does Sharing Economy Shape Consumers' Attitudes? -- Spatial Principles as an active agent. Making Greece a Global Market for Sensitized Tourism -- Understanding Consumers' Attitudes and Behavioural Intentions Towards Corporate Social Responsibility in the Airline Industry: The Role of Perceived Value and Expectations -- Effects of the Blockchain Technology on Human Resources and Marketing. An Exploratory Study -- Indian Cultural Institutions on Instagram -- Island Tourism: Keep it Smart and Sustainable- an Exploratory Approach -- Senior Tourism in Europe: when There are "no boundaries" -- Follow the Trail of Culture through Time: The Use of Archeological Sites as Performance Space -- Tourism as a Process of Promoting and Developing Traditional Settlements -- Brand as a Strategic Asset - A Proposal for the Forthcoming Cultural Institution of Pafos -- The Concept of Analysis and Reconstruction of the Work Time System in a Tourism Enterprise -- A Proposed Online Platform for Ranking Place Brands Identity Characteristics of Official Tourism Websites -- Cyber Security: From Regulations and Policies to Practice -- The Migrant Every Country Wants to Have: Motion, Emotion, Imagination at the Joe Petrosino Museum in Padula, Italy -- The Dynamics of Small and Peripheral Airports in Tourism and Regional Development: the Case of GREECE -- Cultural Tourism, Destination Branding and Spatial Experience Design: Contemporary Hospitality Design in Cyprus -- Innovative Mobile Tourism Services: The case of 'Greek at the Hotel' -- Modeling the International Tourism Demand as a Complex Network: the Case of the Global Inbound Tourism Market -- Netourwork Framework - A New Era in Strategic Innovative Networking System for Tourism Enterprises -- Social Media Celebrities and Para-social Relationships: The Chinese Context -- Environment and Tourism: An Interactive and Creative Relation: the Cases of Vorres Museum and a Cultural Network of Cities -- Trust and Role in the Sharing Economy -- Online Personal Selling, Need for Touch and e-loyalty -- The Passage from the Materialistic Approach to the Integrated One in Cultural Heritage and Cultural Policies: Challenges and Perspectives -- Carrying Capacity Assessment for Tourism Development- A Strategic Approach -- YouTube Videos: a Destination Marketing Outlook -- Strategic Innovations in Tourism Enterprises through Blockchain Technology -- Understanding Tourist Diaspora: An Interdisciplinary Mixed Mode Design Documenting Greek Tourist Diaspora -- Adventur
Zugriffsoptionen:
Die folgenden Links führen aus den jeweiligen lokalen Bibliotheken zum Volltext:
This dissertation explores the ways in which queers understand and practice close relationships in the political, economic and cultural circumstances of contemporary Estonia. The study draws on qualitative methods from sociology and anthropology and is situated at the intersection of queer studies, de/post-colonial studies, family and kinship studies. The starting point is the Estonian emic term lähedased (close ones) and the related term lähedased suhted (close relationships). Closeness refers to proximity, both in the physical and emotional sense, and comes not with the equally loaded baggage of 'family'. The focus on close relationships helps to decentre the typical primary focus on sexual or romantic coupledom, thereby opening up for the possibility of including various kinds of relationships that the study's participants find significant in their lives. The thesis is organised around three main analytical themes. Firstly, it engages with how close relationships by queers are made, maintained, transformed or broken in contemporary Estonia. Secondly, it explores the role that queerness plays in the construction of close relationships. Thirdly, the thesis investigates how practices of care are negotiated in relation to various temporalities. Empirically, the study draws mainly on interviews and ethnographic engagements with non-heterosexual and non-gender conforming people who lived in Estonia between 2016 and 2017. The interviews were complemented with a methodological device called close relationship maps. Additionally, responses (302) from a qualitative online survey conducted in summer 2017 are used to further contextualise the results from the study. The results show that a focus on close relationships allows one to account for a myriad of interpersonal relations that were central in people's lives, even though many were difficult to fit in existing relationship categories. Yet the concept of the family could not be dismissed entirely either, since it played a role for a considerable number of participants in the study. All relationships were to a large degree shaped by widespread economic precarity. This accounts for why my thesis decisively distances itself from the voluntarist discourse on choice. The thesis also challenges a common understanding of the closet that juxtaposes visibility and invisibility, silence and speech. Rather than "coming out" or "living openly", research participants in this study engaged in various everyday practices of opacity with regard to their own queerness. Instead of hiding or separating their queer lives, they often incorporated queerness into their lives in an opaque manner. While this precarious balancing act was conditioned by silences and willed ignorance, it nonetheless satisfied the purpose of maintaining bonds without ever challenging them. Finally, in this study, queers in Estonia not only shared a sense of vulnerability related to their queer positionality, they were subject to the everyday precarity prevalent in the neoliberal, patriarchal and heteronormative state. Both the lacking welfare state and individualist tendencies privileged care along kinship lines, further contributing to the need to compromise between emotions, obligations and dependency. Negotiating various intersecting temporalities was central when engaging in care practices, as chrononormativity, queer/crip/curative time exercised pulls in different directions. ; Denna avhandling utforskar hur queera personer förstår och utövar nära relationer i de samtida politiska, ekonomiska och kulturella förhållandena i Estland. Studien bygger på kvalitativa metoder från sociologi och antropologi och ligger i skärningspunkten mellan queerstudier, de/post-kolonialastudier, familje- och släktskapsstudier. Utgångspunkten är den estniska emic-termen lähedased (nära och kära) och den relaterade termen lähedased suhted (nära relationer). Närhet innefattar både fysiska och emotionella dimensioner och har inte lika mycket bagage som ordet "familj". Fokus på nära relationer möjliggör en bredare analys än det typiska fokuset på sexuell eller romantisk tvåsamhet och öppnar därmed för möjligheten att inkludera olika typer av relationer som deltagarna i studien tycker är betydelsefulla i deras liv. Avhandlingen är organiserad kring tre huvudteman. För det första handlar den om hur queera personers nära relationer skapas, underhålls, förvandlas eller bryts i det samtida Estland. För det andra granskar den queerhetens roll i konstruerandet av nära relationer. För det tredje undersöker avhandlingen hur omsorgspraktiker förhandlas fram i förhållande till olika temporaliteter. Empiriskt bygger studien huvudsakligen på intervjuer och etnografiska möten med icke-heterosexuella och könsöverskridande personer som bodde i Estland mellan 2016 och 2017. Intervjuerna kompletterades med en metod där deltagare ombads att rita en karta över sina nära relationer. Dessutom används svar (302) från en kvalitativ enkätundersökning som genomfördes online sommaren 2017, för att ytterligare kontextualisera resultaten från studien. Resultaten visar att fokus på nära relationer gjorde det möjligt att redogöra för en myriad av relationer som var centrala i människors liv, även ommånga var svåra att passa in i befintliga relationskategorier. Familjebegreppet kunde dock inte avfärdas helt, eftersom det spelade en roll för ett stortantal deltagare i studien. Alla relationer formades till stor del av en utbredd ekonomisk otrygghet, varför min avhandling tar avstånd från den voluntaristiska diskursen om valfrihet. Avhandlingen utmanar också vanliga föreställningar om garderoben som något som motsätter synlighet och osynlighet, tystnad och tal. I ställetför att "komma ut" eller "leva öppet", utövade forskningsdeltagare i denna studie olika dagliga praktiker av opacitet i relation till sin egen queerhet. Istället för att gömma eller avskilja sina queera liv, inkorporerade de ofta queerhet i sina liv på ett ogenomskinligt sätt. Medan denna osäkra balansgång var villkorad av tystnader och medveten ignorans, uppfyllde den ändå syftet att upprätthålla band utan att utmana dem. Queera personer i Estland delade i studien inte bara en känsla av sårbarhet relaterad till deras queera positionalitet, utan de var också föremål för den vardagliga otryggheten som rådde i den nyliberala, patriarkala och heteronormativa staten. Både den bristfälliga välfärdsstaten och individualistiska tendenser privilegierade omsorg längs släktskapslinjer, vilket ytterligare bidrog till behovet av att kompromissa mellan känslor, plikter och beroende. Att förhandla om olika korsande temporaliteter var centralt när queera personer ägnade sig åt omsorgspraktiker, eftersom temporala aspekter som krononormativitet, queer/crip/kurativ tid utövade dragningskraft i olika och ibland motsatta riktningar
This guide accompanies the following article: Sarah E. Rusche and Zachary W. Brewster, '"Because they tip for shit!" The Social Psychology of Everyday Racism in Restaurants,'Sociology Compass 2/6 (2008): 2008–2029, 10.1111/j.1751‐9020.2008.00167.xAuthor's IntroductionThe context of the article is very relatable to students, many who have worked in restaurants and most who eat in them. Sociologically, this article taps into three major topical areas: racism and discrimination, social psychology and workplaces. This research shows how racist discourse in workplaces shapes servers' discriminatory behavior toward African‐American customers. This article also exposes students to important concepts of social psychology, such as: status beliefs, stereotype activation, cognitive bias, attribution errors, performance expectations, and self‐fulfilling prophecies.Author Recommends:Bonilla‐Silva, Eduardo. 2002. 'The Linguistics of Color‐Blind Racism: How to Talk Nasty about Blacks without Sounding "Racist."'Critical Sociology 28: 41–64.According to the author, color‐blind racism constitutes the primary racial ideology of the post‐civil rights era. This ideology is characterized by linguistic practices surrounding whites' discourse about race‐related issues in the United States. The author outlines five components of the post‐civil rights racial ideology: (1) as a result of the current normative climate most whites, avoid directly expressing their racial views; (2) whites cautiously express their racial views using a variety of 'semantic' moves that conceal their racial prejudices (e.g., 'I'm not prejudiced, but ..., 'I am not black, so I don't know,''Yes and no, but ...,'); (3) whites tend to project racial motivations onto blacks and in doing so they are able to avoid taking responsibility for their own sentiments and actions (e.g., blacks don't want to be friends with us); (4) whites often use diminutives in color‐blind racetalk. For instance, whites rarely say that they are opposed to a racialized matter, such as interracial marriage, but instead express such views by prefacing their position with a diminutive (e.g., 'I'm a little against interracial marriage'); (5) when whites are pushed to discuss sensitive racial topics they often become incoherent and incomprehensible. The author concludes by discussing the potential for race‐neutral policies to emerge out of research that fails to consider the rhetorical tools that whites utilize to preserve the false and socially constructed perception of color blindness.Dirks, Danielle and Stephen K. Rice 2004. 'Dining While Black: Tipping as Social Artifact.'Cornell Hotel and Restaurant Administration Quarterly 45: 30–47.The authors locate the documented racial tipping differential within the context of everyday racism that African Americans, in particular, continue to encounter. The authors' qualitative analysis reveals the existence of what they describe as a 'culture of white servers' within restaurant establishments. Indicative of such a culture are anti‐black sentiments among predominately white wait staff. Such anti‐black sentiments are evidenced in derogatory stereotyping and coded language utilized by servers to privately disparage African‐American patrons. The documented anti‐black beliefs and attitudes among servers constitute the underlying cause of both covert and overt discriminatory server behaviors. Among other examples of racial discrimination, the authors delineate instances wherein servers' expressed an unwillingness to serve black patrons and to avoid doing so they actively engaged in negotiations with other white servers in a game of 'Pass the [Black] Table'. Moreover, the authors find that when servers are 'forced' to wait on African Americans they often admittedly provide inferior service by exerting a minimum amount of effort to these guests. In short, the authors argue that the racial tipping differential is, in part, a manifestation of a server initiated self fulfilling prophecy wherein restaurant servers adhere to racial stereotypes concerning the tipping practices of black patrons and therefore feel justified in discriminating – both overtly and covertly – when delivering service to them. African Americans in‐turn reciprocate with lower than average tips thereby reaffirming servers' anti‐black sentiments.Feagin, Joe R. 1991. The Continuing Significance of Race: Antiblack Discrimination in Public Places. American Sociological Review, 56: 101–116.Drawing on in‐depth interviews with 37 middle‐class African Americans, the author highlights the continuing significance of anti‐black public‐place discrimination. The author's analysis provides an empirical challenge to contemporary claims that discrimination no longer threatens economically advantaged African Americans. To the contrary, the author's research details incidents of public‐place discrimination (e.g., restaurants, retail stores, pools, public streets, etc.) including avoidance, poor service, verbal epithets, threats, and harassment. The author also explores African Americans' coping responses to such disparate treatment. Findings show that in response to public accommodation discrimination (e.g., restaurants, stores, etc.) victims are likely to engage the perpetrator in a verbal confrontation or may withdraw to avoid the time and energy that a confrontation requires. Street discrimination, on the other hand, offers victims less protection and is more likely to involve violence, leaving their responses more restricted. Common responses to street discrimination include withdrawal, resigned acceptance, or quick verbal retorts. The author argues that the nature and consequences of contemporary discrimination can only be understood once the important intersection between the individual's and group's accumulated experiences with discrimination are considered.Fiske, Susan T. and Shelley E. Taylor. 1984. 'Social Schemata' in Social Cognition, Reading, MA: Addison‐Wesley.In this chapter from Social Cognition, Fiske and Taylor explain the concept social schemata, discussing a wide range of research on its functions. Social schemata, or schemas, are 'cognitive structures' that store organized knowledge about some object, idea or person. A schema organizes and stores information in a related way, sort of like a filing cabinet of prior experience. Schemata help individuals process information – about situations, objects, or people – efficiently. A fundamental assumption of this concept is that perceivers actively construct their own reality through the creation and interpretation of meaning. This assumption is important when considering that schemata are virtually unchanging; the schemas become real to those who hold them. What the authors call the perseverance effect suggests that schemata tend to persevere despite evidence that contradicts the schema. (For example, relating to Rusche and Brewster's research, a server with a schema that views black patrons as poor tippers will be activated despite experiences with black patrons who tip well). It is much more difficult to change a schema than it is to develop one. While Fiske and Taylor argue that schemata do not generally change, they also note that discrepancies are the most common catalysts for schema change. Since the information does not fit the schema, the perceiver must consider the reasons and further consider the accuracy of the schema.Mallinson, Christine, and Zachary W. Brewster. 2005. '"Blacks and Bubbas": Stereotypes, Ideology, and Categorization Processes in Restaurant Servers'. Discourse.'Discourse and Society 16: 787–807.In this paper, the authors analyze data from 15 in‐depth interviews with restaurant servers to investigate how stereotypes and categories are formed in casual interaction and casual discourse. Findings suggest that servers categorize customers by drawing on race and class based cues, which are subsequently used to produce two distinct but related types of discriminatory discourse –'racetalk' and what the authors term 'regiontalk'. According to the authors, racetalk and regiontalk can be understood as constituting structured forms of discourse that appears to cast the speaker as 'color‐blind' or 'class‐blind' but that actually serves to justify his or her race‐ and class‐based stereotypes, attitudes, and discriminatory behaviors against racial minorities and lower‐class southern whites –'redneck/bubbas'. Findings show that when categorizing black patrons, race alone is sufficient to invoke cultural stereotypes that correspond with the cognitive category of 'black' in servers' minds. As such, servers do not differentiate between black patrons. In contrast, servers' categorization of 'redneck' patrons draws on many regional and/or class‐based characteristics that are manifested in markers of cultural capital (such as linguistic behavior, table manners, and style of dress, which may be similar to class status markers). Another key difference between racetalk and regiontalk delineated by the authors involves the use of positive self‐presentation. Findings demonstrate that servers generally follow their use of negative other‐presentation with positive self‐presentation when speaking about black patrons, but this is not the case when speaking about the redneck social type. While there are marked differences between the two forms of discourse the authors argue that both racetalk and regiontalk can be seen as discourses of colonialism, since they both reflect and maintain stereotypes and categorizations that draw upon, support, and sustain the ideology of white supremacy that has dominated past and present American society.Ridgeway, Cecilia L. and Kristan Glasgow Erickson. 2000. 'Creating and Spreading Status Beliefs.'American Journal of Sociology, 106: 579–615.The authors outline findings from two experiments that lend support to status construction theory, which claims that status beliefs are spread through interaction and behavior. Status beliefs are shared cultural beliefs that people in one group are more esteemed and competent than those in another group. These status beliefs create social distinctions based on categories such as race, age, gender, and occupation. Status beliefs are extremely pervasive and are a product of categorization processes, for without these categorizations, important social distinctions could not be made. In addition, they are also maintained and reproduced through the spreading of these beliefs throughout the culture by individuals and institutions. Status beliefs can be 'spread' and taught to others who share nominal characteristics like race or job title. The first experiment discussed found that by treating 'the other' according to the status beliefs, actors teach the belief to their peers (e.g. race‐peers; workplace peers). The second experiment showed that those who witness these behaviors also develop the status belief. The implications of the spreading of status beliefs are far‐reaching in that this process enables dominant groups to spread status beliefs that will be widely embraced.Online Materials: 1. Understanding Race – Lived Experience http://understandingrace.com/lived/index.html RACE is a project of the American Anthropological Association. Using historical and scientific examinations of race, as well as lived experiences with racism, the RACE project seeks to reveal the 'unreality' of race. Most relevant for this article is the section on lived experience, where students can play games about everyday experiences in 'different' shoes, take quizzes about stereotypes, explore how race is defined on censuses across the globe, see a film about the contradictions black girls face regarding the beauty standard, read a blog where experiences of racism and discrimination have been documented and discussed, and much more. The other sections of this project can provide supplemental learning opportunities for students including the history of racial classification, timelines, details on human variation, and information about what genetics, biology and health have to do with race. 2. FRONTLINE http://www.pbs.org/wgbh/pages/frontline/ FRONTLINE's website is user friendly and provides a host of resources for educators of the behavioral and social sciences. On this website teachers will find a large library of documentaries that have aired on The Public Broadcast Station (PBS) over the last 26 years. While this site offers something relevant to just about any sociology course that one teaches the documentaries exploring diversity in America are particularly noteworthy. A Class Divided and The O. J. Verdict are two specific documentaries that are relevant to any course on race and ethnic relations. The website also provides teachers with lesson plans, discussion questions, active learning exercises, and student assignments that align with each of the one hour documentaries.Sample syllabus:This article can be used in multiple settings, but would be especially relevant to courses on racism or social psychology. To maximize breadth, we have included units for which this article may useful. Depending on the focus of the course, this article can be used differently, either emphasizing the discussion about racism and discrimination, or by emphasizing the social‐psychological processes in a course in this field. Unit – Racism and Discrimination Concepts: Everyday Racism New Racism or Color‐blind Racism Systemic Racism Racist Discourse Stereotypes Discrimination Readings: Antecol, Heather and Deborah A. Cobb‐Clark. 2006. 'Racial and Ethnic Discrimination in Local Consumer Markets: Exploiting the Army's Procedures for Matching Personnel to Duty Locations.'The Australian National University Centre for Economic Policy Research, Discussion Paper No. 544. Available online at <http://econrsss.anu.edu.au/pdf/DP544.pdf>.Coates, Rodney D. 2008. 'Covert Racism in the USA and Globally.'Sociology Compass 2: 208–231. Reference Online. DOI: 10.1111/j.1751-9020.2007.00057.xDirks, Danielle and Stephen K. Rice 2004. 'Dining While Black: Tipping as Social Artifact.'Cornell Hotel and Restaurant Administration Quarterly 45: 30–47.Essed, Philomena. 'Everyday Racism' in A Companion Study of Race and Ethnic Relations. David Theo Goldberg and John Solomos [eds]. 2002. Blackwell Reference Online. DOI: 10.1111/b.9780631206163.2002.00020.xFeagin, Joe R. 1991. The Continuing Significance of Race: Antiblack Discrimination in Public Places. American Sociological Review 56: 101–116.Mallinson, Christine, and Zachary W. Brewster. 2005. '"Blacks and Bubbas": Stereotypes, Ideology, and Categorization Processes in Restaurant Servers' Discourse.'Discourse and Society 16: 787–807.Rusche, Sarah E. and Zachary W. Brewster. '"Because they tip for shit!": The Social Psychology of Everyday Racism in Restaurants.'Sociology Compass 2/6 (2008), pp. 2008–2029. DOI: 10.1111/j.1751-9020.2008.00167.xSwim, Janet K., Lauri L. Hyers, Laurie L. Choen, Davita C. Fitzgerald, and Wayne H. Bylsma. 2003. 'African American College Students' Experiences with Everyday Racism: Characteristics of and Responses to These Incidents.'Journal of Black Psychology 29: 38–67.Tomaskovic‐Devey, Donald, Marcinda Macon, and Matthew Zingraff. 2004. 'Looking for the Driving While Black Phenomena: Conceptualizing Racial Bias Processes and Their Associated Distributions.'Police Quarterly 7: 3–29.Van Dijk, Teun A. 'Discourse and Racism' in A Companion Study of Race and Ethnic Relations. David Theo Goldberg and John Solomos [eds]. 2002. Blackwell Reference Online. DOI: 10.1111/b.9780631206163.2002.00017.x Unit – Social Psychology of Everyday Racism Concepts: Self‐fulfilling prophecy Stereotypes; Stereotype Activation Social Cognition Attribution Errors Racist Discourse Readings: Berard, Tim J. 'The Neglected Social Psychology of Institutional Racism.'Sociology Compass 2/2 (2008), pp. 734–764. DOI: 10.1111/j.1751-9020.2007.00089.xBonilla‐Silva, Eduardo. 2002. 'The Linguistics of Colorblind Racism: How to Talk Nasty about Blacks without Sounding "Racist"', Critical Sociology, 28, 1–2, 41–64.Correll, Shelley J. and Cecilia L. Ridgeway. 2003. 'Expectation States Theory.' In Delamater, John [ed.]. 2003. Handbook of Social Psychology, Springer: New York.Devine, P. G. 1989. 'Stereotypes and Prejudice: Their Automatic and Controlled Components.'Journal of Personality and Social Psychology 56: 5–18.Fiske, Susan T. 2000. 'Stereotyping, Prejudice, and Discrimination at the Seam between the Centuries: Evolution, Culture, Mind, and Brain.'European Journal of Social Psychology 30: 299–322.Fiske, Susan T. 2004. 'Intent and Ordinary Bias: Unintended Thought and Social Motivation Create Casual Prejudice.'Social Justice Research, 17: 117–127.Kaiser, Cheryl R. and Carol T. Miller. 2001. 'Stop Complaining! The Social Costs of Making Attributions to Discrimination.'Personality and Social Psychology Bulletin 27: 254–263.Kawakami, Kerry, Heather Young, and John F. Dovidio. 2002. 'Automatic Stereotyping: Category, Trait, and Behavioral Activations.'Personality and Social Psychology Bulletin 28: 3–15.Pettigrew, Thomas. 1979. 'The ultimate attribution error: Extending Allport's cognitive analysis of prejudice.'Personality and Social Psychology Bulletin 5: 461–476.Ridgeway, Cecilia L. and Kristan Glasgow Erickson. 2000. 'Creating and Spreading Status Beliefs.'American Journal of Sociology 106: 579–615.Rusche, Sarah E. and Zachary W. Brewster. '"Because they tip for shit!": The Social Psychology of Everyday Racism in Restaurants.'Sociology Compass 2/6 (2008), pp. 2008–2029. DOI: 10.1111/j.1751-9020.2008.00167.xTomaskovic‐Devey, Donald, Marcinda Macon, and Matthew Zingraff. 2004. 'Looking for the Driving While Black Phenomena: Conceptualizing Racial Bias Processes and Their Associated Distributions.'Police Quarterly 7: 3–29.Focus and discussion questions:
How does the authors' use of triangulation improve their research results? What is the relationship between systemic racism and social‐psychological aspects of racism? What role does workplace discourse play in servers' discrimination? In what other contexts is discourse used to promote, justify or minimize discrimination? Are there further‐reaching consequences for blacks apart from the quality of dining experiences? In what other contexts might these social‐psychological processes play out If restaurant managers or owners wanted to eliminate racist discourse and discrimination against blacks in their restaurants, how could they go about doing it?
Project Ideas: 1. Racist Discourse Assignment (Adapted from an assignment developed by Christine Mallinson, University of Maryland, Baltimore County)Now that you have read our article as well as research by Bonilla‐Silva (2002), Dirks and Rice (2004), and Mallinson and Brewster (2005), you are ready to begin doing research to corroborate what you have learned from these authors. Thus, for this assignment you will collect and analyze evidence of racialized restaurant server discourse. Such discourse is disproportionately evidenced when servers converse about patrons' tipping behaviors. Begin by visiting The Original Tipping Page (http://tipping.org), a website that is specifically geared toward restaurant servers and which includes a job‐related discussion board. On this site, restaurant servers post messages on discussion boards and debate issues related to their jobs, including the tipping practices of patrons. Task: Search these online postings and gather data about how servers talk about racial differences in tipping behaviors. On The Original Tipping Page, collect servers' online postings by clicking on the 'Forums' link in the toolbar at the top of the home page. From there, you can access the discussion board by clicking on the 'Enter the Board' link at the bottom of the page and then clicking on the 'Tipping Forum' link on the following page. Upon entering the 'Tipping Forum', students can read/search various postings from servers for evidence of 'racetalk,' racial prejudice, stereotyping, and discrimination (be sure to search the archives too). When analyzing1 the data you collected, look for patterns in servers' discourse and pay particular attention to the properties of racetalk as described by Bonilla‐Silva (2002) and Mallinson and Brewster (2005). There are many other server blogs that you are encouraged to explore in search of data on servers' racialized discourse, which provide opportunities for analytic comparison. These include but are not limited to: The Bitter Waitress (http://bitterwaitress.com), The Insane Waiter (http://allprowaiter.blogspot.com), Waiter Rant (http://WaiterRant.Net), The Stained Apron (http://stainedapron.com), Raging Server (http://www.ragingserver.com/), and The Upset Waitress (http://upsetwaitress.com). 2. Restaurant Ethnography Assignment For this assignment, you will collect data and write a short ethnography on the racialized nature of restaurant establishments. Your first task is to select a restaurant that will serve as your research site. Because you will be spending a considerable amount of time in this restaurant, we suggest taking some time to think about the type of restaurant that you find most interesting. For instance, you may want to explore the racialized nature of small locally owned and operated restaurants (e.g., 'ma and pop' type establishments). Alternatively, you may think about doing your field research in a corporate owned chain restaurant (e.g., Red Lobster, Outback Steak House, Applebee's, etc.), such as those explored in Rusche and Brewster's (2008) research. Another option is to explore the racialized nature of 'ethnic' restaurants, such as Chinese, Mexican or Indian restaurants. Owing to the fact that students will be doing their research in different types of restaurants, we encourage instructors to allocate class time to discussing emergent similarities and differences across research sites.Once you have chosen a research site of interest to you, it is time to begin doing research by visiting your chosen restaurant (we suggest requiring students to log a minimum of hours to be determined by the instructor). While in the field, you should attempt to position yourself in a location that allows you to observe the interactions between servers, customers, and managers (e.g., the bar area or host stand). While observing the activities of the restaurant, you should take brief notes on what you see, hear, and think. These notes will permit you to identify patterns in observed behaviors and interactions over the course of your research. These notes will become the data that you will later analyze. While it is impossible to foresee the exact patterns that you will find, existing research should inform your analysis. There is a wealth of empirical evidence that shows that contemporary racism is subtle in nature in contrast to the overt nature of Jim Crow era racism. The subtle nature of contemporary racism will likely make it difficult to identify racialized workplace patterns. We encourage you to carefully observe both server–customer interactions as well as those among servers, if you have the vantage point to do so. Some questions that you might explore include: Are there are any differences in the way white servers interact with white customers versus black patrons? Do white servers smile at whites when greeting them more than comparable black tables? Do servers appear to be more friendly or welcoming when providing service to whites compared with blacks? Do white and black customers appear equally satisfied or dissatisfied with their service? How do you know? Do servers 'check in' with white tables more than black tables?Once you have collected and analyzed the data, it is time to write an analytic paper using data excerpts to support your argument. Details for this assignment will vary by instructor but can include analytic memos or other sociological research reports.Notes* Correspondence address: Pomona College. Email: serusche@chass.ncsu.edu
1 The data students collect can be analyzed in class and facilitated by the instructor or alternatively can be analyzed on their own time and turned in as a course project or term paper. We also suggest that instructors consider having students complete the assignment in small groups.
This is the second volume of the Advances in Global Services and Retail Management Book Series. This volume has the following parts: Part 1: Hospitality and Tourism Part 2: Marketing, E-marketing, and Consumer Behavior Part 3: Management Part 4: Human Resources Management Part 5: Retail Management Part 6: Economics Part 7: Accounting and Finance Part 8: Sustainability and Environmental Issues Part 9: Information Technology ISBN: 978-1-955833-03-5 Hospitality and Tourism Significance of VR in the spa: A spatial analysis Irini Lai Fun Tang, Schultz Zhi Bin Xu, and Eric Chan Social media marketing in rural hospitality and tourism destination research Samuel Adeyinka-Ojo and Shamsul Kamariah Abdullah All aboard! Is space tourism still a fantasy or a reality: An investigation on Turkish market Emrah Tasarer, Vahit Oguz Kiper, Orhan Batman, and Oguz Turkay Strategic consciousness and business performance relationship of open innovation strategies in food and beverage businesses Muhsin Halis, Kazim Ozan Ozer, Hasan Cinnioglu, and Zafer Camlibel The effects of COVID-19 epidemic on guided tours and alternative tour samples from Turkey Bayram Akay The effect of COVID-19 phobia on holiday intention Halil Akmese and Ali Ilgaz The effect of the usage of virtual reality in tourism education on learning motivation Sarp Tahsin Kumlu and Emrah Ozkul The impact of effective implementation of customer relationship management to the success of hotels in Afikpo North local government of Ebonyi State, Nigeria Ogboagha Callister and Managwu Lilian The influence of study travel on quality-oriented education: The case of Handan, China Wang Jingya and Alaa Nimer Abukhalifeh The impact of U.S. Cuba policies on Cuban tourism industry: Focus on the Obama and Trump Administration Jukka M. Laitamaki, Antonio Diaz Medina, and Lisandra Torres Hechavarria Determination of students' characteristics and perspectives about social entrepreneurship: A case of Anadolu University Muhammed Kavak, Ipek Itir Can, and Emre Ozan Aksoz The place of Kazakhstan tourism sector in the countries of the region in terms of transportation infrastructure Maiya Myrzabekova, Muhsin Halis, and Zafer Camlibel What are tour guides most praised for? A sharing economy perspective Derya Demirdelen-Alrawadieh and Ibrahim Cifci An examination of representations for USA in tourism brochures for Chinese market Yasong Wang An exploratory study on cognitive internship perception of tourism students Ozge Buyuk and Gulsah Akkus Are you afraid to travel during COVID-19? Gulsum Tabak, Sibel Canik, and Ebru Guneren Destination management during the health emergency: A bibliometric analysis Valentina Della Corte, Giovanna Del Gaudio, Giuliana Nevola, Enrico Di Taranto, and Simone Luongo Determination of food neophobia levels of International Mersin Citrus Festival participants Sevda Sahilli Birdir, Nurhayat Iflazoglu, and Kemal Birdir Analysis of effectiveness of industrial exposure training undertaken by students of hospitality management in star hotels G. Saravana Kumar Conceptualization of ecotourism service experiences framework from the dimensions of motivation and quality of experiences: Four realms of experience approach Jennifer Kim Lian Chan Does Coronavirus (COVID-19) transform travel and tourism to automation (robots)? M. Omar Parvez, Ali Ozturen, and Cihan Cobanoglu Efficiency of internal control systems and the effect of organizational structure and culture on internal control systems in accommodation industry Kadriye Alev Akmese and Ali Ilgaz Ethical perceptions of housekeeping department employees: A study in Izmir Province Tuba Turkmendag and Bayram Sahin Factors that prevent participation of tourists in online co-creation activities Resat Arica, Feridun Duman, and Abdulkadir Corbaci Health sector after COVID-19: Salt thermal facilities example Azize Serap Tuncer and Sinan Bulut PRISMA statement and thematic analysis framework in hospitality and tourism research Samuel Adeyinka-Ojo Evaluation of Turkish nights as a tourism product: The case of Cappadocia Meral Buyukkuru, Eda Ozgul Katlav, and Firdevs Yonet Eren Customer perceptions against COVID-19 precautionary measures of the restaurants: The case of Istanbul-Turkey Elif Kaymaz and Sevki Ulema Analysis of e-complaints regarding hotel restaurants during COVID-19 process: The case of Antalya Sevim Usta and Serkan Sengul Marketing, E-marketing, and Consumer Behavior Materialistic social consumption amidst COVID-19 pandemic: Terror management theory in the Malaysia context Seong-Yuen Toh and Siew-Wai Yuan A conceptual framework for the mediating role of the flow experience between destination brand experience and destination loyalty Ipek Kazancoglu and Taskin Dirsehan Investigating drivers influencing choice behaviour of Islamic investment products Hanudin Amin Local food festivals within the scope of destination branding Hatice Akturk and Atilla Akbaba Marketing a destination on social media: Case of three municipalities of Izmir Huseyin Ozan Altin and Ige Pirnar Perceived usefulness, ease of use, online trust and online purchase intention: Mediating role of attitude towards online purchase Muhammed Yazeed, Mohammed Aliyu Dantsoho, and Adamu Ado Abubakar Social media framework for businesses Nawel Amrouche Social media marketing the African door of return experience in Badagry-Nigeria Huseyin Arasli, Maryam Abdullahi, and Tugrul Gunay The effect of corporate social responsibility on consumer-based brand equity: A research on automobile brands Ali Koroglu and Ibrahim Avci The effect of superstitions on consumer luck, horoscope and evil eye-oriented purchasing behavior: A study in Turkey Ibrahim Avci and Salih Yildiz The evaluation of S-D orientation on service innovation and performance of airline Inci Polat and Ozlem Atalik Brand new leisure constraint: COVID-19 Guliz Coskun The impact of consumers price level perception on emotions towards supermarkets Abdulcelil Cakici and Sena Tekeli The impact of TikTok's plastic surgery content on adolescents' self-perception and purchase intention Markus Rach Accelerated modernity: What are the social media stories undergraduate students engage with? Pericles Asher Rospigliosi and Sebastian Raza-Mejia Virtual influencer as celebrity endorsers Fanny Cheung and Wing-Fai Leung Does millennial shopping orientation using augmented reality enabled mobile applications really impact product purchase intention? Anil Kumar Exposure to e-cigarette marketing and product use among highly educated adults Onur Sahin Extending the theory of planned behavior to explain intention to use online food delivery services in the context of COVID -19 pandemic Ahmed Chemseddine Bouarar, Smail Mouloudj, and Kamel Mouloudj Factors affecting investors' buying decision in real estate market in Northern Cyprus Gurkan Arslan and Karen Howells From home to the store: Combined effect of music and traffic on consumers shopping behaviour Luigi Piper, Lucrezia Maria de Cosmo, Maria Irene Prete, and Gianluigi Guido Market expansion and business growth from the perspective of resources and capabilities: The case of a micro-enterprise Jose G. Vargas-Hernandez and Omar C. Vargas-Gonzalez How learning style interacts with voice-assisted technology (VAT) in consumer task evaluation Bonnie Canziani and Sara MacSween Effect of brand credibility and innovation on customer based brand equity and overall brand equity in Turkey: An investigation of GSM operators Suphan Nasir and Ozge Guvendik Value chain for a B school in India Vimal Chandra Verma and Devashish Das Gupta Management AI as a boost for startups companies: Evidence from Italy Irene Di Bernardo, Marco Tregua, Greco Fabio, and Ruggiero Andrea The role of quality management applications for corporate reputations Ibrahim Sapaloglu and Isik Cicek Toxicity in organizations: A sample study on the perceived toxicity in Turkish academicians Mustafa Hakan Atasoy and Muhsin Halis Which resources are matter to healthcare performance? A case study on Bahrain Mahmood Asad Ali and Mohamed Sayed Abou Elseoud Case study: HereWay Inc. European expansion: A facility location problem Mikhail M. Sher, Michael T. Paz, and Donald R. (Bob) Smith In search of the effective mission statement: Structural support of the firm's culture to augment financial performance Seong-Yuen Toh Innovation labs to support tourism organization in transforming crisis into opportunities: Insight from a case study Francesco Santarsiero, Daniela Carlucci, and Giovanni Schiuma Novelty and success of healthcare service innovation: A comparison between China and the Netherlands Yu Mu, Rujun Wang and Ying Huang Public private partnership in selected countries: A comparative analysis Bekir Parlak and Abdullahi Suleiman Hashi Strategic orientation of service enterprises towards customers Korhan Arun and Saniye Yildirim Ozmutlu The effects of organizational culture on information sharing attitude Mohammadi Lanbaran Nasrin and Cicek Isik The impact of industry 4.0 strategy on the work-life balance of employees Ali Sukru Cetinkaya The mediating effect of psychological empowerment on inclusive leadership and innovative work behaviour: A research in hotels Emete Toros, Ahmet Maslakci, and Lutfi Surucu Assessment of industry 4.0 on manufacturing enterprises: Demographic perspective Ali Sukru Cetinkaya and M. Kemal Unsacar Human Resources Management Affective commitment in new hires' onboarding? The role of organizational socialization in the fashion retail industry Pui Sze Chan, Ho Ching Ching, Pui Yi Ng, and Annie Ko Do burnout perception levels of nurses working in the health sector differ according to demographic characteristics? Irfan Akkoc and Korhan Arun Examining a moderating effect of employee turnover between recruitment and selection practice and organizational performance in Maldives civil service sector Fathmath Muna, Azam S. M. Ferdous, and Ahmad Albattat Personnel relationships in the workplace Ali Sukru Cetinkaya, Shafiq Habibi, and Umut Yavuz The evolution of human resources empowerment theory: A literature review (1970–2020) Theodoros Stavrinoudis and Moschos Psimoulis Teamwork, satisfaction and mediating effect of affective, continuance and normative commitments on employee's loyalty Thalita Aparecida Costa Nicolleti, Eduardo Roque Mangini, Leonardo Aureliano-Silva, Cristiane Sales Pires, and Carolina Aparecida de Freitas Dias Perceptions of teachers in educational institutions regarding the principles of teaching professional ethics Gulsah Aki, Nejat Ira, and Hasan Arslan Influence of psychological empowerment on employee competence in Nigerian universal basic education system: The mediating role of work engagement Isah Sani, Rashidah Binti Mohammad Ibrahim, and Fazida Karim Retail Management Artificial intelligence in retailing Ibrahim Kircova, Munise Hayrun Saglam, and Sirin Gizem Kose Customer value in retailing (2000-2020): A narrative review and future research directions Rajat Gera and Ashish Pruthi Effect of social media marketing on online retail performance of Konga Nigeria LTD Abubakar Ado Adamu, Muhammed Yazeed, Mohammed Aliyu Dantsoho, Jamilu Abdulkadir, and Aliyu Audu Gemu Employment of blue-collar workers in organized retail sector: The case of Turkey Inci Kayhan-Kuzgun Saving grace: Digitization to stay or address crisis? Smitha Vasudevan Inclusion of disabled consumers in online retail landscape: Web accessibility conformance of Turkish organized food retailers' web sites Asiye Ayben Celik A customer segmentation model proposal for retailers: RFM-V Pinar Ozkan and Ipek Deveci Kocakoc Economics Nigeria's economic management: Reflections through monthly interest rate movement from 1996 to 2020 and beyond Job Nmadu, Halima Sallawu, and Yebosoko Nmadu A qualitative study of perceptions of the residents of Sidon, Lebanon regarding the economic effect on Sidon with reference to repatriation of the Palestinian refugees Raja El Majzoub and Karen Howells Three keys of development: Knowledge, efficiency and innovative entrepreneurship Irfan Kalayci, Ali Soylu, and Baris Aytekin Tourism and women empowerment: Empirical findings from past experience and predictions for the post-COVID era Burcu Turkcan COVID-19 effect on FDI motivation and their impact on service sector: Case of Georgia Vakhtang Charaia and Mariam Lashkhi Economic cooperation between Central Caucasus, China, and EU, under COVID-19 challenges Vakhtang Charaia and Mariam Lashkhi Effect of real exchange rate and income on international tourist arrivals for Turkey Erhan Aslanoglu, Oral Erdogan, and Yasin Enes Aksu Innovative entrepreneurship in Turkey: Micro and macro perspectives Irfan Kalayci, Baris Aytekin, and Ali Soylu Optimal fiscal and price stability in Germany: Autoregressive distributed lags (ARDL) cointegration relationship Ergin Akalpler and Dahiru Alhaji Birnintsabas Struggle with COVID-19 crisis within the scope of financial national security: The example of the Republic of Turkey Silacan Karakus The nexus between fiscal freedom and investment freedom: The case of E7 countries Mehmet Bolukbas To be or not to be a female entrepreneur in the Mexicali Valley Roberto Burgueno Romero and Jose David Ledezma Torrez Accounting and Finance Comparative measurement of working capital efficiency for Borsa Istanbul restaurants and hotels for the COVID-19 period and previous quarters Fatih Gunay and Gary Cokins Relationship between business confidence index and non-financial firms foreign exchange assets and liabilities: Evidence from ARDL bound approach Ilkut Elif Kandil-Goker The impact of RTGS on internal control - A comparative study between some Iraqi banks Salowan H. Al Taee and Noor A. Radhi The impact of working capital on cash management under IAS 7 framework: An examination of tourism listed companies in Indonesia and Turkey Tri Damayanti and Tuba Derya Baskan A nexus between mergers & acquisitions and financial performance of firms: A study of industrial sector of Pakistan Fiza Quareshi, Mukhtiar Ali, and Salar Hussain Decentralized approach to deep-learning based asset allocation Sarthak Sengupta, Priyanshu Priyam, and Anurika Vaish Sustainability and Environmental Issues Blockchain technology applied to the Consortium Etna DOC to avoid counterfeiting Matarazzo Agata, Edoardo Carmelo Spampinato, Sergio Arfo, Ugo Sinigaglia, Antonino Bajeli, and Salvino Benanti Eco-label certification, hotel performance and customer satisfaction: Analysis of a case study and future developments Michele Preziosi, Alessia Acampora, Roberto Merli, and Maria Claudia Lucchetti The integration of circular economy in the tourism industry: A framework for the implementation of circular hotels Martina Sgambati, Alessia Acampora, Olimpia Martucci, and Maria Claudia Lucchetti Using the theory of planned behavior to explore green food purchase intentions Katrina Anna Auza and Kamel Mouloudj Survey on purchasing methods of food products in Tarragona and Catania Matarazzo Agata, Vazzano Tommaso Alberto, and Squillaci Carmelo Information Technology Comparative analysis of tools for matching work-related skill profiles with CV data and other unstructured data Florian Beuttiker, Stefan Roth, Tobias Steinacher, and Thomas Hanne State-of-the-art next generation open innovation platforms Murielle De Roche, Monika Blaser, Patrick Hollinger, and Thomas Hanne The coverage of AIOT based functional service: Case study of Asian futuristic hotel Gege Wang, Irini Lai Fun Tang, Eric Chan, and Wai Hung Wilco Chan The effect of the blockchain technology on service companies and food retailers: An overview of the blockchain use cases and applications Gokhan Kirbac and Erkut Ergenc The regulation problem of cryptocurrencies Lamiha Ozturk and Ece Sulungur Understanding information technology acceptance by physicians: Testing technology acceptance model Anuruddha Indika Jagoda
This is the second volume of the Advances in Global Services and Retail Management Book Series. This volume has the following parts: Part 1: Hospitality and Tourism Part 2: Marketing, E-marketing, and Consumer Behavior Part 3: Management Part 4: Human Resources Management Part 5: Retail Management Part 6: Economics Part 7: Accounting and Finance Part 8: Sustainability and Environmental Issues Part 9: Information Technology ISBN: 978-1-955833-03-5 Hospitality and Tourism Significance of VR in the spa: A spatial analysis Irini Lai Fun Tang, Schultz Zhi Bin Xu, and Eric Chan Social media marketing in rural hospitality and tourism destination research Samuel Adeyinka-Ojo and Shamsul Kamariah Abdullah All aboard! Is space tourism still a fantasy or a reality: An investigation on Turkish market Emrah Tasarer, Vahit Oguz Kiper, Orhan Batman, and Oguz Turkay Strategic consciousness and business performance relationship of open innovation strategies in food and beverage businesses Muhsin Halis, Kazim Ozan Ozer, Hasan Cinnioglu, and Zafer Camlibel The effects of COVID-19 epidemic on guided tours and alternative tour samples from Turkey Bayram Akay The effect of COVID-19 phobia on holiday intention Halil Akmese and Ali Ilgaz The effect of the usage of virtual reality in tourism education on learning motivation Sarp Tahsin Kumlu and Emrah Ozkul The impact of effective implementation of customer relationship management to the success of hotels in Afikpo North local government of Ebonyi State, Nigeria Ogboagha Callister and Managwu Lilian The influence of study travel on quality-oriented education: The case of Handan, China Wang Jingya and Alaa Nimer Abukhalifeh The impact of U.S. Cuba policies on Cuban tourism industry: Focus on the Obama and Trump Administration Jukka M. Laitamaki, Antonio Diaz Medina, and Lisandra Torres Hechavarria Determination of students' characteristics and perspectives about social entrepreneurship: A case of Anadolu University Muhammed Kavak, Ipek Itir Can, and Emre Ozan Aksoz The place of Kazakhstan tourism sector in the countries of the region in terms of transportation infrastructure Maiya Myrzabekova, Muhsin Halis, and Zafer Camlibel What are tour guides most praised for? A sharing economy perspective Derya Demirdelen-Alrawadieh and Ibrahim Cifci An examination of representations for USA in tourism brochures for Chinese market Yasong Wang An exploratory study on cognitive internship perception of tourism students Ozge Buyuk and Gulsah Akkus Are you afraid to travel during COVID-19? Gulsum Tabak, Sibel Canik, and Ebru Guneren Destination management during the health emergency: A bibliometric analysis Valentina Della Corte, Giovanna Del Gaudio, Giuliana Nevola, Enrico Di Taranto, and Simone Luongo Determination of food neophobia levels of International Mersin Citrus Festival participants Sevda Sahilli Birdir, Nurhayat Iflazoglu, and Kemal Birdir Analysis of effectiveness of industrial exposure training undertaken by students of hospitality management in star hotels G. Saravana Kumar Conceptualization of ecotourism service experiences framework from the dimensions of motivation and quality of experiences: Four realms of experience approach Jennifer Kim Lian Chan Does Coronavirus (COVID-19) transform travel and tourism to automation (robots)? M. Omar Parvez, Ali Ozturen, and Cihan Cobanoglu Efficiency of internal control systems and the effect of organizational structure and culture on internal control systems in accommodation industry Kadriye Alev Akmese and Ali Ilgaz Ethical perceptions of housekeeping department employees: A study in Izmir Province Tuba Turkmendag and Bayram Sahin Factors that prevent participation of tourists in online co-creation activities Resat Arica, Feridun Duman, and Abdulkadir Corbaci Health sector after COVID-19: Salt thermal facilities example Azize Serap Tuncer and Sinan Bulut PRISMA statement and thematic analysis framework in hospitality and tourism research Samuel Adeyinka-Ojo Evaluation of Turkish nights as a tourism product: The case of Cappadocia Meral Buyukkuru, Eda Ozgul Katlav, and Firdevs Yonet Eren Customer perceptions against COVID-19 precautionary measures of the restaurants: The case of Istanbul-Turkey Elif Kaymaz and Sevki Ulema Analysis of e-complaints regarding hotel restaurants during COVID-19 process: The case of Antalya Sevim Usta and Serkan Sengul Marketing, E-marketing, and Consumer Behavior Materialistic social consumption amidst COVID-19 pandemic: Terror management theory in the Malaysia context Seong-Yuen Toh and Siew-Wai Yuan A conceptual framework for the mediating role of the flow experience between destination brand experience and destination loyalty Ipek Kazancoglu and Taskin Dirsehan Investigating drivers influencing choice behaviour of Islamic investment products Hanudin Amin Local food festivals within the scope of destination branding Hatice Akturk and Atilla Akbaba Marketing a destination on social media: Case of three municipalities of Izmir Huseyin Ozan Altin and Ige Pirnar Perceived usefulness, ease of use, online trust and online purchase intention: Mediating role of attitude towards online purchase Muhammed Yazeed, Mohammed Aliyu Dantsoho, and Adamu Ado Abubakar Social media framework for businesses Nawel Amrouche Social media marketing the African door of return experience in Badagry-Nigeria Huseyin Arasli, Maryam Abdullahi, and Tugrul Gunay The effect of corporate social responsibility on consumer-based brand equity: A research on automobile brands Ali Koroglu and Ibrahim Avci The effect of superstitions on consumer luck, horoscope and evil eye-oriented purchasing behavior: A study in Turkey Ibrahim Avci and Salih Yildiz The evaluation of S-D orientation on service innovation and performance of airline Inci Polat and Ozlem Atalik Brand new leisure constraint: COVID-19 Guliz Coskun The impact of consumers price level perception on emotions towards supermarkets Abdulcelil Cakici and Sena Tekeli The impact of TikTok's plastic surgery content on adolescents' self-perception and purchase intention Markus Rach Accelerated modernity: What are the social media stories undergraduate students engage with? Pericles Asher Rospigliosi and Sebastian Raza-Mejia Virtual influencer as celebrity endorsers Fanny Cheung and Wing-Fai Leung Does millennial shopping orientation using augmented reality enabled mobile applications really impact product purchase intention? Anil Kumar Exposure to e-cigarette marketing and product use among highly educated adults Onur Sahin Extending the theory of planned behavior to explain intention to use online food delivery services in the context of COVID -19 pandemic Ahmed Chemseddine Bouarar, Smail Mouloudj, and Kamel Mouloudj Factors affecting investors' buying decision in real estate market in Northern Cyprus Gurkan Arslan and Karen Howells From home to the store: Combined effect of music and traffic on consumers shopping behaviour Luigi Piper, Lucrezia Maria de Cosmo, Maria Irene Prete, and Gianluigi Guido Market expansion and business growth from the perspective of resources and capabilities: The case of a micro-enterprise Jose G. Vargas-Hernandez and Omar C. Vargas-Gonzalez How learning style interacts with voice-assisted technology (VAT) in consumer task evaluation Bonnie Canziani and Sara MacSween Effect of brand credibility and innovation on customer based brand equity and overall brand equity in Turkey: An investigation of GSM operators Suphan Nasir and Ozge Guvendik Value chain for a B school in India Vimal Chandra Verma and Devashish Das Gupta Management AI as a boost for startups companies: Evidence from Italy Irene Di Bernardo, Marco Tregua, Greco Fabio, and Ruggiero Andrea The role of quality management applications for corporate reputations Ibrahim Sapaloglu and Isik Cicek Toxicity in organizations: A sample study on the perceived toxicity in Turkish academicians Mustafa Hakan Atasoy and Muhsin Halis Which resources are matter to healthcare performance? A case study on Bahrain Mahmood Asad Ali and Mohamed Sayed Abou Elseoud Case study: HereWay Inc. European expansion: A facility location problem Mikhail M. Sher, Michael T. Paz, and Donald R. (Bob) Smith In search of the effective mission statement: Structural support of the firm's culture to augment financial performance Seong-Yuen Toh Innovation labs to support tourism organization in transforming crisis into opportunities: Insight from a case study Francesco Santarsiero, Daniela Carlucci, and Giovanni Schiuma Novelty and success of healthcare service innovation: A comparison between China and the Netherlands Yu Mu, Rujun Wang and Ying Huang Public private partnership in selected countries: A comparative analysis Bekir Parlak and Abdullahi Suleiman Hashi Strategic orientation of service enterprises towards customers Korhan Arun and Saniye Yildirim Ozmutlu The effects of organizational culture on information sharing attitude Mohammadi Lanbaran Nasrin and Cicek Isik The impact of industry 4.0 strategy on the work-life balance of employees Ali Sukru Cetinkaya The mediating effect of psychological empowerment on inclusive leadership and innovative work behaviour: A research in hotels Emete Toros, Ahmet Maslakci, and Lutfi Surucu Assessment of industry 4.0 on manufacturing enterprises: Demographic perspective Ali Sukru Cetinkaya and M. Kemal Unsacar Human Resources Management Affective commitment in new hires' onboarding? The role of organizational socialization in the fashion retail industry Pui Sze Chan, Ho Ching Ching, Pui Yi Ng, and Annie Ko Do burnout perception levels of nurses working in the health sector differ according to demographic characteristics? Irfan Akkoc and Korhan Arun Examining a moderating effect of employee turnover between recruitment and selection practice and organizational performance in Maldives civil service sector Fathmath Muna, Azam S. M. Ferdous, and Ahmad Albattat Personnel relationships in the workplace Ali Sukru Cetinkaya, Shafiq Habibi, and Umut Yavuz The evolution of human resources empowerment theory: A literature review (1970–2020) Theodoros Stavrinoudis and Moschos Psimoulis Teamwork, satisfaction and mediating effect of affective, continuance and normative commitments on employee's loyalty Thalita Aparecida Costa Nicolleti, Eduardo Roque Mangini, Leonardo Aureliano-Silva, Cristiane Sales Pires, and Carolina Aparecida de Freitas Dias Perceptions of teachers in educational institutions regarding the principles of teaching professional ethics Gulsah Aki, Nejat Ira, and Hasan Arslan Influence of psychological empowerment on employee competence in Nigerian universal basic education system: The mediating role of work engagement Isah Sani, Rashidah Binti Mohammad Ibrahim, and Fazida Karim Retail Management Artificial intelligence in retailing Ibrahim Kircova, Munise Hayrun Saglam, and Sirin Gizem Kose Customer value in retailing (2000-2020): A narrative review and future research directions Rajat Gera and Ashish Pruthi Effect of social media marketing on online retail performance of Konga Nigeria LTD Abubakar Ado Adamu, Muhammed Yazeed, Mohammed Aliyu Dantsoho, Jamilu Abdulkadir, and Aliyu Audu Gemu Employment of blue-collar workers in organized retail sector: The case of Turkey Inci Kayhan-Kuzgun Saving grace: Digitization to stay or address crisis? Smitha Vasudevan Inclusion of disabled consumers in online retail landscape: Web accessibility conformance of Turkish organized food retailers' web sites Asiye Ayben Celik A customer segmentation model proposal for retailers: RFM-V Pinar Ozkan and Ipek Deveci Kocakoc Economics Nigeria's economic management: Reflections through monthly interest rate movement from 1996 to 2020 and beyond Job Nmadu, Halima Sallawu, and Yebosoko Nmadu A qualitative study of perceptions of the residents of Sidon, Lebanon regarding the economic effect on Sidon with reference to repatriation of the Palestinian refugees Raja El Majzoub and Karen Howells Three keys of development: Knowledge, efficiency and innovative entrepreneurship Irfan Kalayci, Ali Soylu, and Baris Aytekin Tourism and women empowerment: Empirical findings from past experience and predictions for the post-COVID era Burcu Turkcan COVID-19 effect on FDI motivation and their impact on service sector: Case of Georgia Vakhtang Charaia and Mariam Lashkhi Economic cooperation between Central Caucasus, China, and EU, under COVID-19 challenges Vakhtang Charaia and Mariam Lashkhi Effect of real exchange rate and income on international tourist arrivals for Turkey Erhan Aslanoglu, Oral Erdogan, and Yasin Enes Aksu Innovative entrepreneurship in Turkey: Micro and macro perspectives Irfan Kalayci, Baris Aytekin, and Ali Soylu Optimal fiscal and price stability in Germany: Autoregressive distributed lags (ARDL) cointegration relationship Ergin Akalpler and Dahiru Alhaji Birnintsabas Struggle with COVID-19 crisis within the scope of financial national security: The example of the Republic of Turkey Silacan Karakus The nexus between fiscal freedom and investment freedom: The case of E7 countries Mehmet Bolukbas To be or not to be a female entrepreneur in the Mexicali Valley Roberto Burgueno Romero and Jose David Ledezma Torrez Accounting and Finance Comparative measurement of working capital efficiency for Borsa Istanbul restaurants and hotels for the COVID-19 period and previous quarters Fatih Gunay and Gary Cokins Relationship between business confidence index and non-financial firms foreign exchange assets and liabilities: Evidence from ARDL bound approach Ilkut Elif Kandil-Goker The impact of RTGS on internal control - A comparative study between some Iraqi banks Salowan H. Al Taee and Noor A. Radhi The impact of working capital on cash management under IAS 7 framework: An examination of tourism listed companies in Indonesia and Turkey Tri Damayanti and Tuba Derya Baskan A nexus between mergers & acquisitions and financial performance of firms: A study of industrial sector of Pakistan Fiza Quareshi, Mukhtiar Ali, and Salar Hussain Decentralized approach to deep-learning based asset allocation Sarthak Sengupta, Priyanshu Priyam, and Anurika Vaish Sustainability and Environmental Issues Blockchain technology applied to the Consortium Etna DOC to avoid counterfeiting Matarazzo Agata, Edoardo Carmelo Spampinato, Sergio Arfo, Ugo Sinigaglia, Antonino Bajeli, and Salvino Benanti Eco-label certification, hotel performance and customer satisfaction: Analysis of a case study and future developments Michele Preziosi, Alessia Acampora, Roberto Merli, and Maria Claudia Lucchetti The integration of circular economy in the tourism industry: A framework for the implementation of circular hotels Martina Sgambati, Alessia Acampora, Olimpia Martucci, and Maria Claudia Lucchetti Using the theory of planned behavior to explore green food purchase intentions Katrina Anna Auza and Kamel Mouloudj Survey on purchasing methods of food products in Tarragona and Catania Matarazzo Agata, Vazzano Tommaso Alberto, and Squillaci Carmelo Information Technology Comparative analysis of tools for matching work-related skill profiles with CV data and other unstructured data Florian Beuttiker, Stefan Roth, Tobias Steinacher, and Thomas Hanne State-of-the-art next generation open innovation platforms Murielle De Roche, Monika Blaser, Patrick Hollinger, and Thomas Hanne The coverage of AIOT based functional service: Case study of Asian futuristic hotel Gege Wang, Irini Lai Fun Tang, Eric Chan, and Wai Hung Wilco Chan The effect of the blockchain technology on service companies and food retailers: An overview of the blockchain use cases and applications Gokhan Kirbac and Erkut Ergenc The regulation problem of cryptocurrencies Lamiha Ozturk and Ece Sulungur Understanding information technology acceptance by physicians: Testing technology acceptance model Anuruddha Indika Jagoda
The Dublin Metropolitan Police (DMP) Prisoners Books for 1905-1908 and 1911-1918 are amongst the most valuable new documents to come to light on the revolutionary decade. They include important information on social and political life in the capital during the last years of the Union, from the period of widespread anticipation of Home Rule, to the advent of the 1913 Lockout, the outbreak of the First World War, the Easter Rising and its aftermath, including the conscription crisis of 1918. They will also be invaluable to those interested in criminology, genealogy, and family history. ; Scope and content: The collection comprises of four large leather bound, double ledger volumes containing hand written entries that record the details of daily charge sheets issued by DMP members to offenders or alleged offenders. Each volume contains the name, age, address, occupation, alleged offence and, in most cases, outcome of cases involving over 30,000 people arrested by the DMP. Each volume also contains an index of prisoners with references to the pages containing details of the charge. ; Scope and content: Three of the four volumes bear the title "Prisoners Book" and each page of arrest records has the running title "Prisoners charged with offences involving dishonesty". Three of the volumes are numbered on the spine - the first volume in the collection as 1, the third as 4, and the fourth as 5. The third volume in the collection is missing the number on the spine, but as the entries in this volume are dated immediately before those in book number 4, it has been assumed that this volume was numbered as 3. There is a gap in the dates between the volume numbered as 1 and this volume, so it is assumed that there was a volume number 2. It is unknown whether this volume survives. Volume 1 records all those arrested from April 1st 1905 to January 1st 1908. The second volume (assumed to be number 3) runs from January 1st 1911 to September 30th 1913. Volume 4 contains the entries from October 1st 1913 to 31st December 1915. Volume 5 records the arrests from January 1st 1916 to September 30th 1918. ; Biographical/historical information: The Dublin Metropolitan Police (DMP) was established in 1836, along with the Irish Constabulary (later to be known as the Royal Irish Constabulary (RIC)). The DMP and the RIC replaced the County Constabulary, a uniformed police force formed on a regional basis. Following the War of Independence and the truce of July 1921, the RIC disbanded and a new police force, "The Civic Guard" (renamed the Garda Síochána na hÉireann on 8 August 1923) was formed. The DMP merged with An Garda Síochána in 1925. There were 20 DMP stations located in Dublin City and the southern townships (most of County Dublin fell within the remit of the Royal Irish Constabulary). They were Blackrock, the Bridewell, Chancery Lane, Clarendon Street, Clontarf, College Street, Dalkey, Donnybrook, Fitzgibbon Street, Irishtown, Kevin Street, Kill O the Grange, Kilmainham, Kingstown, Lad Lane, Mountjoy, Newmarket, Rathmines, Store Street and Terenure. It is thought that the station sergeant in the Bridewell, which adjoined the Police Magistrates' Courts, was responsible for collating the records from all the DMP stations. The alleged crimes detailed in the records range from murder to robbing sweet machines, and those arrested range in age from eight to 80. The passing of the Defence of the Realm Act (DORA) on August 8th 1914 created an important new series of offences that were used increasingly against political activists. ; Biographical/historical information: Besides describing the type of offences committed, whether ordinary or political crimes, the collection tells us a great deal about the type of people arrested, their gender balance, social problems in the city, sentencing policies of the Police Magistrates, and how events such as the 1913 Lockout and Easter Rising affected different groups in the community. For instance, these records confirm that the majority of people arrested during the 1913 Lockout were workers rather than "the foul reserves of the slums" as alleged by the Irish Catholic and other newspapers owned by William Martin Murphy. They also show a sharp rise in arrests of deserters and absentees from the British armed forces once the First World War broke out, a problem ignored in practically every account of the period. On the other hand, the large scale arrests of women in the aftermath of the Easter Rising for looting in the city centre do conform to the traditional narrative and correlate to areas of the city with widespread deprivation. The increasing incidence of public order offences and arrests under DORA from 1916 onwards often depict people not traditionally associated with criminal behaviour but more representative of the wider community, while the rising incidence of juvenile crime is a common feature across cities in wartime Europe. The information in these volumes serves, therefore, to provide new perspectives on life in Dublin during a time of war and revolution. ; Ownership/custodial history: Volume number 4, covering the latter end of 1913 to the end of 1915, has been in the continuous possession of the DMP and then the Garda Museum and Archives. The other three volumes were probably discarded when the DMP was abolished in 1924 and were held by a private individual or individuals, before being discarded again in 2015. They were retrieved in the north Dublin inner city by a group of community activists who contacted author, journalist, and trade union activist Pádraig Yeates, through Michael Finn, a retired Detective Superintendent of the Garda Síochána. Pádraig Yeates arranged, with the permission of the group, to have all the volumes digitised by Eneclann. The group subsequently agreed to hand the volumes over to SIPTU on two conditions: one was that a donation be made to support a local youth project, and the second was that the information contained in them would go online, free to the public. SIPTU agreed to make a substantial donation to the project and UCD Library undertook to provide an open access, online digital publishing platform for the volumes. ; Acquisition details: SIPTU provided three volumes to UCD Library, already digitised. UCD Library then digitised the volume for 1913 to 1915, held by the Garda Museum and Archives. On completion of the work, SIPTU presented the volumes in its possession to the Garda Museum and Archives. ; Location of original: All four volumes in this collection are now held by the Garda Museum and Archives.
Life Cycle Contract Model in the Public Private Partnership for the Tourism Sector in North Toraja Regency.Muhammad H. Djabbari, Alwi, Suryadi & LambaliDepression, Anxiety and Fear during the COVID-19 Pandemic Movement Control Order (MCO) in Malaysia. Salina Nen, Fauziah Ibrahim, Norulhuda Sarnon, Noremy Mohd Akhir & Hilwa AbdullahPattern of Islamic Philanthropy Fund Management in Community Empowerment in Malang (Studies in LAZIS Muhammadiyah Malang). Zaenal Abidin, Oman SukmanaResilience in Handling COVID-19 in Blitar City. Iradhad Taqwa Sihidi, Salahudin, M. Jafar Loilatu, & Ali RoziqinThe Role of Rumah Zakat in Community Economic Empowerment and how Mustahiq's Saving Behaviour during the Covid-19 Pandemic in Indonesian Village. Neneng Alghina Micha Grandisa, Aditya Rahmat Gunawan, & Siti Mulyani HasanahThe Role of Micro, Small and Medium Enterprises in Achieving Sustainable Development Goals during Covid-19 Crisis. Annisa NurfitrianaCovid-19 Murals: Autocritique Messages from Society in the Public Sphere. Cosmas Gatot HaryonoSweden's less Stringent Management on Handling COVID-19 Pandemic: the Challenge of the Welfare State System and its Securitization Agenda. Adzkia Rahma Sakinah, Henny Saptatia Drajati Nugrahani,& Rizky AuliaLocal Bossism in Parking Retribution Management in Malang City. Achmad Apriyanto Romadhan, Iradhad Taqwa Sihidi, Ali Roziqin & Muhammad KamilSmall Medium Enterprise during Pandemic COVID 19: from Bibliometric Analysis. Ardik PraharjoThe Brutal Killing of Muslims at Al Noor Mosque, Christchurch, New Zealand: a Study of Media News Discourse Theo Van Leeuwen's Exclusion Discourse Analysis Model on kompas.com news. Budi SupraptoHow Islamic Banks do During the Pandemic? Happy Febrina Hariyani, Delphi Milenia Toyiba & Mohammad Faisal AbdullahWhy There are so Many Thrift Stores at Malang, While it's an Illegal Business? Wakid Abdul Aziz Attamimia, Hidayat Ali & Fakhru Rizal MuayisHabermasian Reflections on the Pandemic and Transformational Leadership. Andhika Rahmat Saputra, Ghaly Rizquillah Ahrizal & Takdir Al FaruqThe Role of Readiness to Change between Transformational Leadership and Work Performance in Higher Education during COVID-19 Pandemic. Aniek Rumijati, Sandra Irawati & Khusnul Rofida NoviantiArtifical Intelligence as an Instrument to Improve the Quality of Public Service. Asep NurjamanFinancial Distress: from Bibliometric Analysis to Current Research, Future and Trends Research Directions and Content Analysis. Chalimatuz Sa'diyah, Bambang Widagdo, & Erna Retna RahadjengThe Potential of ASEAN in Restoring the Economy of the Southeast Asian Region due to Covid-19. Devita PrinandaAnalyzing the Dynamics of Smart Library Readiness in Indonesia. Djoko Sigit Sayogo, Sri Budi Cantika Yuli & Muhammad Wildan AffanThe Performance of Paradiplomacy in the International Development Cooperation for SDGs. Dyah Estu KurniawatiBanking Contributions and the Impact of Internal Banking Conditions during the Covid-19 Pandemic. Novi Primita Sari, Dhurotus Sangadah & M. Faisyal AbdullahThe Influence of the COVID-19 Pandemic period on Voluntaristic Actions in the Care of Elderly Parents in Modern Families. Fauzik Lendriyono & Tsaniah FariziahChallenging Minister to Loneliness: Strategy of Government to Response Women's Suicide in Japan? Hamdan Nafiatur RosyidaPurchase Decisions based on Design and Customization of Mask Products (Study on Millennial Generations in Pandemic era). Luqman Dzul Hilmi, Siti Nurhasanah,& Immanuel Mu'ammalStrategic Policy: Application of Participatory Innovation in Electronic-based Public Sector Services in Malang City (malang online service system study - SINGO). Krishno Hadi,& Yana S. HijriDigital Marketing in Pandemic era (Perspective Bibliometric). Marsudi, Yulist Rima Fiandari & Iqbal Ramadhani FuadiputraPublic Diplomacy of "la maison de l'Indonésie" in Supporting Indonesian Small Enterprises during and post COVID-19 Crisis. Mathieu Mergans, Sutanto Sastraredja, Ratih Juliati & Devita PrinandaFrom Local to Global: Development and Transformation of bye-bye Plastic Bags Movement. Najamuddin Khairur Rijal & Sal SabilaAn Innovative Strategic Human Resource Management in Uncertain World: a Systematic Literature Review. Nazaruddin Malik, Sri Budi Cantika Yuli & MudrifahAnalysis of Factors to consider in Selection of Suppliers at Coffee Shops during the Pandemic. Nurul Asfiyah, Kenny Roz & Jihan Bari'atu RThe Involvement Strategies of Local Knowledge in Creating a Sustainable City. Rachmad Kristiono Dwi SusiloThe Effect of COVID-19 to Organizational Changes and Job Satisfaction in Turnover Intention. Rizki Febriani, Achmad Mohyi & Eka KadharpaCommunity Development by the Tourism Industry in the Pandemic COVID-19 (study on Community Empowerment around the Selecta Tourism Industry in a Gender Perspective in Batu City). Tutik SulistyowatiThe Role of Business Innovation on the Influence of Entrepreneurship Orientation on the Performance of COVID-19 affected MSMES. Uci Yuliati, Fika Fitriasari& Mathieu MergansBibliometric Analysis of Entrepreneurial Marketing during COVID-19 Pandemic. Yeyen Pratika, Rohmat Dwi Jatmiko, & Sri Nastiti AndhariniLocal Community values-based University Social Responsibility (USR): in Indonesia context. Driana Leniwati, Endang Dwi Wahyuni, Ihyaul Ulum & Kurbonov IzatulloThe Influence of Modeling and Reinforcement from Parents on Helping Behavior in Children: a study at Pondok Bestari Indah Housing, Malang Regency. Oman Sukmana & Erinda Dwimagistri SukmanaHow to Empower Women through Protection Policies?Saenab & Muhammad RusdiTypology of Islamophobia in Indonesia: Qualitative Analysis of tweet content on Twitter. Sahran Saputra & Nirwansyah PutraWali Songo, Communication as Personal Branding: Critical Study of Posmodernists. Mursidi & R. Iqbal RobbieSMART TREN: Economic Recovery Program post Covid-19 at Modern Islamic Boarding Schools (Pesantren) in Semarang City. Sih Darmi Astuti, Herry Subagyo & Risanda A. BudiantoroAn Analysis on the Dual Role of Working Mothers in the era of Pandemic COVID-19.Cahyanti Puspaningsih, Suparman Abdullah & Rahmat Muhammad
Technical Report 2018-08-ECE-137 Technical Report 2002-09-ECE-006 Engineering of Enterprises a Transdisciplinary Activity Murat M. Tanik Ozgur Aktunc John Tanik This technical report is a reissue of a technical report issued September 2002 Department of Electrical and Computer Engineering University of Alabama at Birmingham August 2018 Technkal Report 2002-09-ECE-006 Engineering of Enter·prises A Transdisciplim•ry Activity Murat M. Tanik Ozgur Aktunc John Tanik TECHNICAL REPORT Department of Electrical and Computer Engineering University of Alabama at Birmingham September 2002 ENGINEERING OF ENTERPRISES A TRANSDISCIPLINARY ACTIVITY OVERVIEW Contributed by: Murat M. Tanik, Ozgur Aktunc, and John U. Tanik This module is composed of two parts: Part I surveys and defines Enterprise Engineering in the context of transdiscipline. Part II introduces Internet Enterprise and addresses engineering implementation consider ations. PART I ENTERPRISE ENGINEERING ESSENTIALS 1 INTRODUCTION When Henry Ford rolJed out his first automobile assembly during 1913, he created the archetype of single-discipline enterprise. Ford's adventure was a self-contained and efficient exercise in mechankal engineering. With no competition, no regulatory constraints, and no pressing need for cross-disciplinary partnerships, from design development to process development, all ideas primarily originated from Ford's own engineers. The world is a different place today. Automobiles are complicated hybrids of mechanical, electrical, electronic, chemicaJ, and software components. Modern 4 manufacturers must now pay dose attention to new technological developments in hardware (mechanisms associated with physical world), software (mechanisms associated with computational world), netware (mechanisms associated with communications), and peopleware (mechanisms associated with human element). The changes experienced in the automotive industry exemplify the needs of the ever increasingly complex nature of today's modern enterprise. In other words, the ubiqui tous existence of the ";computing element" forces us to take into account disciplinary notions, ranging from psychology to ecology. In one word, the world is becoming transdisciplinary. In this world of transdisciplinary needs, we need to approach designing of enterprises as engineers, moving away from the traditional ad hoc approach of the past. This module expl ai n~ the changes to be made to current enterprise organization in order to be successful in the networked economy. A brief definition of Enterprise Engineering is given as an introduction, foJJowed by a summary of Enterprise Engineering subtopics, namely modeling, analysis, design, and implementation. In the last section of Part I, the definition of an intelJigent enterprise is made with an emphasis on knowledge management and integration using Extensible Markup Language (XML) technology [1]. 2 DEFINITION The Society for Enterprise Engineering (SEE) defined Enterprise Engineering as ";the body of knowledge, principles, and practices having to do with the analysis, design, implementation and operation of an enterprise" [2]. Enterprise Engineering methods include modeling, cost analysis, simulation, workflow analysis, and bottleneck analysis. 5 In a continually changing and unpredictable competitive environment, the Enterprise Engineer addresses a fundamental challen ge: ";How to design and improve all elements associated with the total enterprise through the use of engineering and analysis methods and tools to more effectively achieve itsgoals and objectives" [3]. Enterpr.ise Engineering has been considered as a disdpline after its establishment in the last decade of the 20th Century. The discipline has a wor]dvicw that is substantial enough to be divided into sub-areas, with a foundation resting on several reference disciplines. In the Enterprise Engineering worldview, the enterprise is viewed as a complex system of processes that can be engineered to accompli sh specific organizational objectives. Enterprise Engineering has used several reference disciplines to develop its methods, technologies, and theories. These reference disciplines can be listed as the following: Industrial Engineering, Systems Engineering, Information Systems, Information Technology, Business Process Reengineeling, Organizational Design, and Human Systems [2]. 2.1 Understanding Enterprise Engineering Like most engineering profession als, Enterprise Engineers work on four main areas: modeling, analyzing, design, and implementation. One important issue facing Enterprise Engi neering is the development of tools and techniques to support the work of analyzing, designing, and imp1ementjng organizational systems. These tools must assist enterprise engineers in the initial transformation of functional, often disjoint, operations into a set of integrated business processes replete with supporting information and control systems [4]. To develop new models of enterprises, the enterprise should be analyzed 6 using process analysis, simulation, activity-based analysis, and other tools. Also an abstract representation of the enterprise and the processes should be modeled in a graphical, textual, or a mathematical representation. The . design issues in Enterprise Engineering consist of developing vision and strategy, integration and improvement of the enterprise, and developing technology solutions. Lastly, implementation deals with the transformation of the entetprise, integration of corporate culture, strategic goals, enterprise processes, and technology. We will take a look at these areas in the fol1owing section: • Enterprise Engineering Modeling (EEM), • Analyzing Enterprises, • Design of Enterprises, and • Implementation. 2.2 Enterprise Engineering Modeling Enterprise Engineering Modeling (EEM) is basically dealing with the abstraction of engineering aspects of enterprises and connecting them to other business systems. The model encompasses engineering organizations' products, processes, projects, and, ultimately, the ";engineered assets" to be operated and managed. EEM coordinates design and deployment of products and assets at the enterprise level. It integrates engineering information across many disciplines, allows engineering and business data to be shared through the combinatjon of enterprise IT (information technology) and engineering IT, and simulates the behavior of intelligent, componentbased models [5). 7 The selection and design of enterprise processes for effective cooperation is a prime objective of Enterprise Engineering. Enterprise models can assist the goal of Enterprise Engineering by helping to represent and analyze the structure of activities and their interactions. Models eliminate the irrelevant details and enable focusing on one or more aspects at a time. Effective models also facilitate the discussions among different stakeholders in the enterprise, helping them to reach agreement on the key fundamentals and to work toward common goals. Also it can be a basis for other models and for different information systems that support the enterprise and the business. The enterprise model will differ according to the perspective of the pers.on creating the model, including the visions of the enterprise, its efficiency, and other various elements. The importance of an enterprise model is that it wm provide a simplified view of the business structure that will act as a basis for communication, improvements, or innovations and define the Information Systems requirements that are \ necessary to support the business. The term business in this context is used as a broad term. The businesses or the activities that can be represented with Enterprise Engineering models do not have to be profit making. For example, it can be a research environment with the properties of an enterprise. Any type of ongoing operation that has or uses resomces and has one or more goals, with positive or negative cash flow, can be referred to as a business [6]. The ideal business model would be a single diagram representing all aspects of a business. However this is impossible for most of businesses. The business processes are so complex that one diagram cannot capture all the information. Instead, a business model is composed of different views, diagrams, objects, and processes: A business 8 model is illustrated with a number of different views, and each captu~cs infmmation about one or more specific aspects of the businesses. Each view consists of a number of diagrams, each of which shows a specific part of the business structure. A diagram can show a ~1ructure (e.g., the organization of the business) or some dynamic collaboration (a number of objects and their interaction to demonstrate a process). Concepts are related in the diagrams through the use of different objects and processes. The objects may be physical such as people, machines, and products or more abstract such as instructions and services. Processes are the functions in the business that consume, refine, or use objects to affect or produce other objects. There are cunently hundreds of modeling tools for enterprises, and many modeling techniques such as Integrated Definition Language (IDEF), Petri-Net, Unified Mode1ing Language (UML), and meta-modeling. Modeling involves a modeling language and the associated modeling tools. Different enterprises may need different modeling tools according to the nature of the enterprise. Before selecting the modeling tool, a detailed analysis should be made to select the most appropriate modeling language and the tool. For the software industry, UML has become the standard modeJjng language [7]. 2.3 Enterprise Analysis The increasing complexity of enterprises has stimulated the development of sophisticated methods and tools for modeling and analysis of today's modern enterprises. Recent advances in information teclu1ology along with significant progress in analytical and computational techniques have facilitated the use of such methods in industry. 9 Applying Enterprise Analysis methods results in a documentation that supports a number of programs, which are as follows: strategic information resource planning, information architecture, technology and services acquisition, systems design and development, and functional process redesign. Most organizations have a wealth of data that can be used to answer the basic questions supporting strategic planning: who, what, where, and bow much. By modeling with these data using an Enterprise Analysis toolset, the enterptise models can be built incrementally and in less time. The most important use of Enterprise Analysis is that it presents the organization's own business, demographic, and workload data in a compelling manner to tell the story. Whether they are used to support programs for acquisitions, information architectures, or systems development, Enterprise Analysis studies are rooted in the business of the organization and thus are easily understood and supported by executive management. 2.4 Enterprise Design The design of an enterprise deaJs with many issues, including development of a vision and a strategy, the establishment of a corporate cu.lture and identity, integration and improvement of the enterprise, and development of technology solutions. Optimization of several perspectives within an enterprise is the objective of Enterprise Design. Examples of enterprise perspectives include quality, cost, efficiency, and agility ,. and management perspectives s uch as motivation, culture, and incentives. For example, consider the efficiency perspective. The modeling task will provide ontologies (i.e., object libraries) that can be used to construct a model of the activities of a process, such as its resource usages, constraints, and time. Based on these models the efficiency 10 perspective will provide tools to design, analyze, and evaluate organizational activities, processes, and structures. These tools will also be capable to represent and model the current status of an enterprise and to analyze and assess potential changes. One issue is wbetber there exists sufficient knowledge of the process of designing and optimizing business activities/processes to incorporate in knowledge-based tools. The main goal of an Enterprise Design application is to deveJ~p a software tool that enables a manager to explore alternative Enterprise Designs that encompass both the stmcture and behavior of the enterprise over extended periods of time. lssues such as motivation, culture, and incentives are explored, along with other relevant parameters such as organizational structure, functions, activity, cost, quality, and information [8]. 3 STRATEGY FORMULATION FORE-BUSINESS Electronic commerce is becoming a growing part of industry and commerce. The speed of technological change is enabling corporations large and small to transact business in a variety of ways. Today, it is routine practice to transact some aspect of business electronically from e-mail to exchanging data via Electronic Data Interchange (EDI), World Wide Web (WWW), and various shades these technologies. Numerous benefits accrue to corporations when they use automated capabilities. In order to maximize such benefits, electronic enterprises must base their efforts on welJdeveloped strategies. In this manner, tbe probability of success is increased many folds. Embarking on electronic commerce or business should never be thought of as the sole quest of the information systems department. The following strategies are a synthesis of II best practices introduced to assist information systems departments to prepare the organization for the information age [9, 1 0]. 3.1 Strategy 1 - Improve Corporate System DeveJopment Skms In addition to developing technical skills, corporations must pay close attention to effective communication, eliminating cross-functional language barriers, and improving inadequate facilities in geographically dispersed systems. 3.2 Strategy 2 -Build a Proactive Infrastructure There must be a constant effort to keep up with technological changes. Frequently, these changes trickle down from the top as a result of various business strategies. For example, top managers may discover that they need video-conferencing capability, and the information technology people are under pressure to deliver it. This kind of approach will put the chief information officer(CIO) in a reactive posture, trying to put out fires as they appear. In putting out such fires, local resources may be used to satisfy higher level needs without any obvious benefits to local managers who may resent this fact and create barriers against success. CIOs should try to get the cooperation of all users in anticipating system needs. If users are not satisfied with an imposed system, they wiiJ try to build their bootleg systems for their own needs. Thus, project needs should be anticipated as far as possible and should be planned to meet both short-term goals of management and yield benefits for the development of the infrastmcture of the corporation in the Jong term. 12 3.3 Strategy 3 - Consolidate Data Centers A corporation embar1dng on developing an e-business system must realize that there do already exist semiautonomous data centers distributed throughout various geographical locations. There may have been a time when such data centers were desirable. Today, e-business demands integrated information systems, and the data centers must be consolidated. An integrated information system is far more effic ient in controlling corporate operations. Obviously, operating fewer facilities, maintaining minimum levels of inventory, and giving better service to customers will bring handsome returns to corporations. During the consolidation process, a number of problems of compatibility and standardization will occm, but tackling such problems is better than having semiautonomous data centers. 3.4 Strategy 4 - Standardize Data Structures As corporations grow, different data processing systems and data centers proliferate, especiaUy in transnational corporations. Consolidating data centers and systems as suggested in strategy 3 may not be sufficient. Corporations need to determine data needed at global levels and standarclize them. Standardization may not be possible for certain applications in an international setting since regulatory accounting of different countries may be a roadblock. However, this should not be taken as a signal for nonstandardization. Standardization will make useful information available throughout the corporation. For example, these days many corporations are adapting XML as part of data stmcture consolidation strategy. XML issues are addressed in the next section with more detail. 13 3.5 Strategy 5 - Accommodate Linkages with Cui-rent Strategic Allies and Provide Expansion for Future Str ategic Alliances Recent developments in globalization and Internet technology are spurring corporations to form sliategic alliances. Automobile manufacturers are, for example, forming alliances to influence prices and qualities of their raw materials and parts purchases. Similar alliances are growing at an accelerated pace in other industries. These alliances are designed to create not only purchasing power but also a variety of other mutual interests, from technological co-operation to joint production. 3.6 Strategy 6 - Globalize Human Resource Accounting As companies centralize their information systems through computerization, a global inventory of human skills should be developed. Frequent human resource problems arjse when Information Systems (IS) personnel focus locally rather than globally. Recmiting of specialists, for example, must be done not with a local perspective but with a global one. This will help eliminate possible redundancies with potential savings. 4 INTELLIGENT ENTERPRISES Enterprises competing in global markets assume complex organizational forms such as supply chain, virtual enterprise, Web-based enterprise, production network, e-business, and e manufacturing. Common traits of these organizations are willingness to cooperate, global distributed product development and manufacturing, and high coordination and communication. These traits have led the trend of transformation from 14 capital intensive to intelligence intensive entetprises [1 1]. Visions of the organization's future e-Business roles as an intelligent enterprise could be formulated as follows [12]: • Transparent - Intelligent enterprises will contain substantial amounts of information on capabilities, capacities, inventories, and plans that can be exchanged between tools, servers, and optimizing agents that will augment capabilities of their human masters. • Timely - Intelligent enterprises will be designed to meet a customer need exactly when the customer wants it. • Tuned - Through collaboration and sharing of knowledge, the intel1igent enterprise wiJl serve customer needs with a mjnimum of wasted effort or assets. 4.1 Knowledge Management and Integration with XML One important challenge for enterprises today is storing and reusing knowledge. For many organizations, up-to-dale knowledge of what is relevant and important to customers distinguishes their offerings. The challenge is to assimilate this rapidly changing knowledge about products and services quickly and distribute it rapidly to leverage it for improved performance and quality service. This means finding all knowledge that is embedded in and accessed through technologies and processes and stored in documents and external repositories and being able to share it quickly with the customers. The capital-based organization needs to transform into bigh-perforrn.ing, processbased, knowledge-based enterprises, characterized by agility, f lexibility, adaptability, and willingness to learn. To overcome the difficulties during the transformation, powetful tools are needed to manage the knowledge within the enterprise and to develop the 15 communication between the company and the customers. The key tool to be used within this process is XML, which will set the standards of communication and wm help to manage the knowledge [13]. To understand how XML will help us managing the knowledge, a def111ition of a knowledge-based business is needed. 4.2 Knowledge-Based Businesses The following six characteristics of knowledge-based business were defined in Davis and Botkin [14]. ~hese characteristics are actually guidelines for businesses to put their information to productive use. 4.2.1 The More You Use Knowledge-Based Offerings, The Smarter They Get This characteristic fits in the customer-defined offerings the companies give. For example, a credit card company can build a system that could understand the buying patterns of a customer that can protect the customer from fraud. A news agency can change the interface of its system to give the type of news that a newspaper or journal requests. Knowledge-based systems not only get smcuter but also enable their users to learn. For example, General Motors' computer-aided maintenance system not only helps novice mechanics to repair automobiles but also helps expe1t mechanics to refine their knowledge. As the technology advances, the amount of information that a mechanic needs to know expands rapidly. With tllis system a mechanic can leverage the knowledge of all mechanics using the system. As a result, the system continually improves, as does the service quality. 16 4.2.2 Knowledge-Based Products And Services Adjust To Changing Circumstances When knowledge is built into a product, the product may adjust itself in a smart manner to changing conditions. For example, a glass window that may reflect or transmit sunlight according to temperature is such a product. Producing tbese producl:s will not only be marketed well but also have important economical advantages. Tbe smart pr~ducts will guide their users as well. 4.2.3 Knowledge-Based Businesses Can Customize l1teir Offerings Knowledge-based products and servkes can determine customers' changing paltems, idiosyncrasies, and specific needs. For example, a smart telephony system can understand which language will be used on specific num bers~ also by using the voice recognition system, the need for telephone credit cards can be diminished. 4.2.4 Knowledge-Based Products A11d Services Have Relatively Short Life Cycles Many knowledge-based products have short life cycles, because they depend on the existing market conditions; their viability is short-lived. For example, the foreign exchange advisory services offered by a commercial bank are highly specialized and customized for corporate clients. Such services should be constantly upgraded to keep the profits and the proprietary edge. 4.2.5 Knowledge-Based Businesses Enable Customers To Act In Real Time Information becomes more valuable when it can be acted on constantly. A system that will deliver the tour book information while you are driving the car will have a great 17 value. An interactivity. added to the system will make the product's value even higher. Knowledge-based products can also act in real time. For example, a copier machine that calJs the maintenance provider when an error occurs wiJJ have a great value in this sense. 4.3 XML's Role in Business Applications The smallest cluster of knowledge is data. These are basic building blocks of information that come in four particular forms: numbers, words, sounds, and images. Manipulation of the data determines its value. The arrangement of data into meaningful patterns is information. For example, numbers can be arranged in tables, which is information; a series of sounds, which is music, can also be considered as information. Today, an important challenge for Internet-based businesses is using the information efficiently and in a productive way that will upgrade the information to knowledge. Thus, we say that knowledge is the application and productive use of information. The shift from the information to knowledge age will be via technology. The new enabling technologies of software development such as XML, J2EE, and Visual Studio are forcing e-businesses to build knowledge-based businesses. Here we will explain the most important enabling technology, XML, within the development of e~businesses. XML can be used effecti~ely for exchanging of business documents and information over the Internet. XML is a standard language that simultaneously presents content for display on the Intemet and describes the content so that other software can understand and use the data. Therefore XML can be a medium through which any business application can share documents, transactions, and workload with any other 18 business application [15]. In other words, XML can become the common language of ebusi. ness and knowledge management. One impmtant property of XML is providing .information about the meaning of the data. Thus, an XML-Jonnatted document could trigger a software application at a receiving company to launch an activity such as shipment loading. But to provide that level of data integration, trading partners would have to agree on definiti ons for the various types of documents as well as standard ways of doing business. In addition to facilitating e-commerce, having common defini tions and uses for data also enable an enterprise to better leverage the .knowledge ctmenrly stored in information silos. XML supports the searching and browsing of such information sHos [16]. It structures documents for granularity, such as alJowing access to sections within documents and fine-tuning retrieval Also, it annotates documents, which enables users to not restrict themselves to what is in the document. XML organizes documents by classifying documents into groups and supports browsing them. AdditionaiJy, it has Hyper Text Markup Language (HTML)-like linking options that help the information users to find the documents they arc seeking. Fig. I shows the tools that are common in the organization of information through XML. XML is the next evolution in knowledge management, and organizations are beginning to understand the potential of this technology to develop enterprise-wide information architectures. As a technology, XML does not bring any value to an organization. The value of XML wHI depend on how it js used within a company. The agreement on data definitions within an enterprise has always been a hard task. At rn.inlmum, XML should be implemented strategically within the organization. Ideally, the 19 Annotate Documents I RDF I Schemas J:: I XML I (.---, X-Poin- ter--, Fig. 1. Organization of information through XML. implementation should include strategic partners and other organizations that have a need to share data and information. XML is a majm advance in the standardization of information sharing across traditional information boundaries, both internal and external Information security and privacy issues are major concerns revolving around customer and corporate data flowing across wires. Successful knowledge management in a company often depends on having access to information outside the enterprise walls. XML can also be of value here by helping to improve the functioning of supply chains and the extranet. In conclusion, it becomes obvious that managing knowledge requires better tools. We need to create systems that manage documents, as people would do, and we know that better tools need better documents. Thus by building on a solid knowledge management strategy using XML, we believe an organization can gain competitive differentiation in the near future. 20 PART II INTERNET ENTERPRISE IMPLEMENTATION CONSIDERATIONS 1 INTRODUCTION In the first section of this module we introduced essential elements of enterprise engineering in abstract and general terms. Building on the notions explored in the first section, we will address here, specifics concerning designing and implementation of Internet enterprises. In this section, a review is provided of the key concepts and concerns an Internet enterprise engineering (IEE) project would encounter and need to address. Business engineering fundamentals, technologies, and strategies for the lrlternet such as Unified Modeling Language, Cosmos Model, Enterprise Maturity Model, Web Business . Models, Methods of Electronic Transaction, Online Contracts, Security Protocols, selected integrated development tools, Next Generation Internet, and Internet2 arc covered. Over 20 occupational roles within IEE are identified and described separately. A technology implementation platform and strategy are introduced, along with marketing and customer retention technologies and strategies on the Internet A detailed overview is provided of the various Internet business tools, technologies, and terminology for the systematic construction of new ventures on the Internet l7]. For convenience, all these issues are summarized in table fmm at the end of this section. 2 BUSINESS ENGINEERING FUNDAMENTALS 2.1 UML: Officially introduced in November 1997, UML has quickly become the standard modeling language for software development [6]. It bas a business model approach that provides a plan for engineering an orchestrated set of business functions. It 21 provjdes a framework by which business is to be performed, allowing for changes and various improvements in the process. The model is designed to be able to anticipate changes in business function in order to maintain an edge on the competition. One of the advantages of modeling in UML is that it can visually depict functions, relationships, and paradigms. UML is a recommended tool for business analysts to break down a large-scale business operation into its constituent parts. Capturing a business model in one diagram is not realistic, so it should be noted that a business model is actually composed of a number of different views. Each view is designed to capture a separate purpose or function without losing any important overall understanding of the business operation. A view is composed of a set of diagrams, each of which shows a specific aspect of the business structure. A diagram can show a structure or a kind of dynamic collaboration. The diagrams contain objects, processes, rules, goals, and visions as defined in the business analysis. Objects contain information about mechanisms in the business, and processes are functions that use objects to affect or produce other objects. Objectoriented techniques can be used to describe a business. There are similar concepts in business functions that mn parallel to object-oriented techniques of designconceptualization. Another advantage of UML is derived from the ability of business modelers and software developers to use the same conceplualization tools and techniques to achieve a common business end. Additionally, the power of UML is derived :from its ability to transcend tbe standard organizational chart [ 17]. 22 2.2 Cosmos Model: A generic approach for a business to manage change is through a holistic framework as described by Yeh in his three-dimensional model called Cosmos (Fig. 1). One of the important aspects of this model is that three dimensions exist interdependently because each dimension behaves as an enabler and an inhibitor to the other dimensions. The ";activity structure" dimension covers how work is structured in an organization, factoring in the steps and tasks that are taken to achieve an appropriate level of workflow. The ";infrastructure dimension" covers how resources are allocated and factors in the assets of an enterprise. The ";coordination dimension" covers how information is created, shared, and distributed. The cultural aspects of the enterprise are factored in here. The Cosmos model provides a conceptual space bounded by concrete factors for successfully navigating from one point of an organizational situation to another. Infrastructure Long-term vs. short-term objectives Activity Structure Stability vs. Flexibility Target Coordination Structure Modu]arity vs. Interconnectedness Fig. l. Cosmos model--holistic framework for managing change. [13) 23 The Cosmos model is an abstract tool for managers to guide their company along the best possible path. The trade-offs between the three dimensions at each point in the journey along the path are what the manager must determine to be most effective and best for the organization as a whole. In the case of work structure, there is an inherent tradeoff between stability and flexibility. In the case of a coordination structure, there is a tradeoff between strictly aligning of human resources with company objectives and providing each operating unit with sufficient autonomy. More autonomous organizations are generally organized with a greater degree of modularity, allowing for the ability to make rapid decisions by adapting to changing market conditions. In the case of infrastlucture, there is a trade-off between seeking short-term gain versus long-term gain. Overall, the Cosmos mode] provides an executive or project manager with another technique to visualize the overaJJ situation and path of an organization by laking into account the three dimensions that correspond to the three main forces that affect its future [ 18]. 2.3 Enterprise Maturity Model: In order to characterize a business in terms of its level of maturity, focus, activity, coordination, and infrastructure, please refer to Table l, provided by Yeh [18]. The table provides an overview of the various levels of enterprise maturity. 2.4 Web Business Models: Entrepreneurs who wish to start e-businesses need to be aware of e-business models and how to implement them effectively. The combination 24 of a company's policy, operations, technology, and ideology defines its business model. Table 2 describes in more detail the types of business models in existence today [6, 19]. 2.5 IVIethods of Elech·onic Transaction: There are various methods and mechanisms that merchants can collect income through electronic transactions. Table 3 provides the types of transactions covered such as credit card, e-walJets, debit cards, digital currency, peer-to-peer, smartcards, micro-payments, and e-billing [19]. 2.6 OnJine Contracts: An online contract can be accomplished throt1gh the use of a digital signature. Digital signatures are the electronic equivalent of written signatures. The Electronic Signatures in Global and National Commerce Act of 2000 (E-sign Bi11) recently passed into law were developed for use in public-key cryptography to solve the problems of authentication and integrity. The purpose of a digital signature is for electronic authorization. The U.S. government's digital authentication standard is called the Digital Signature Algorithm. The U.S. government also recently passed digitalsignature legislation that makes digital signatures as legally bindiqg as handwritten signatures. This legislation is designed to promote more activity in e-business by legitimizing online contractual agreements. 2.7 Security Protocols: Netscape Communkations developed the SSL protocol, developed as a non-proprietary protocol commonly used to secure communication on the Internet and the Web. SSL is designed to use public-key technology and digital 25 certificates to authenticate the server. in a transaction and to protect private information as it passes from one party to another over the Tnternet. SSL can effectively protect information as it is passes through the Internet but does not necessarily protect private information once stored on the merchant's server. An example of private information would be credit card numbers. When a merchant receives credit-card information with an order, the information is often decrypted and stored on the merchant's server until the order is placed. An insecure server wi th data that are not encrypted is vulnerable to unauthorized access by a third party to that information. SET protocol was developed by Visa International and MasterCard and was designed speci.tically to protect e-commerce payment transactions [20]. SET uses digital certificates to authenticate each party in an e-commerce transaction, including the customer, merchant, and the merchant's bank. In order for SET to work, merchants must have a digital certificate and special SET software to process transactions. Additionally, customers must have complementary digital certificate and digital walJet software. A digital wallet is similar to a real wallet to the extent that it stores credit (or debit) card information for multiple cards, as well as a digital certificate verifying the cardholder's identity. Digital wallets add convenience to online shopping because customers no longer need to re-enter their credit card information at each shopping site. 2.8 Integrated Tool Example: Drumbeat 2000: Macromedia Drumbeat 2000 is a tool capable of accepting and delivering complex infmmation and functionality through a web-interface [21]. The tool aids a visually skilled Web designer in competitively building a website without necessarily having to do any coding, which is useful in the 26 initial prolotyping phase. It is a tool that can interact with the back-end database with the ability to build a user-friendly client-side using Active Server Page (ASP) Web technology. ASP technology enables a real-time connection to the database, so any changes made to the database are immediately re flected on the client side. Macromedia D1umbeat 2000 claims to provide everything needed to build dynamic Web applications and online stores visually at a fraction of the typical development time and expense. The designers of Drumbeat 2000 also cl aim that the development environment can keep up with continuously evolving web technology, thus making it a future-oriented technology. 2.9 NGI: This initiatjve is a mulli-agency Federal research and development program began on October 1, 1997 with the participation of the following agencies: DARPA, DOE, NASA, NIH, NIST, and NSF (Table 4). These agencies arc charged with the responsibility of developing advanced networking technologies and revolutionary applications that require advanced networkjng. 2.10 Internet2: The Intemet2 is a consortium of over 180 uruversit ies leading the way towards a partnership with industry and government to develop advanced network applications and technologies in order to accelerate formation of a more advanced Internet. The primary goals of Internct2 are to create a leading edge network capability for the national research community, enable revolutionary Internet applications, and ensure the rapid transfer of new network services and applications to the broader Internet community. Through Intemet2 working groups and initiatives, Internet2 members are 27 collaborating on advanced app.lications, middleware, new networking capabilities, advanced network infrastructure, partnerships, and alliances [22). 3 OCCUPATIONAL ROLES IN illE In order to build, deploy, and maintain an Internet Enterprise, certain roles and positions most be filled for the organization to be effective. Table 5 lists and describes many of the relevant roles required within an enterprise initiative, such as Chief Privacy Officer (CPO), in addition to the more traditional organizational roles such as Chief Executive Ofilcer (CEO), Chief Technology Officer (CTO), and Chief Financial Officer (CFO) [20, 23]. 4 TECHNOLOGY IMPLEMENTATION AND STRATEGY 4.1 Microsoft Dotsmart Initiative: There are various approaches to imp.lementing strategic planning and technology implementations. For illustrative purposes, Microsoft is considered in this thesis to be one such approach for enterprise planning. Once the overall conceptualization and business pattern is created and a.ll the necessary occupational roles within the organization are identified, it is necessary to identify exactly which technology to utilize in order to build and implement the business venture. As the requirements of a business are analyzed, a useful guide is the Microsoft Dotsmarl Initiative. This mode of business analysis will help determine which business engineering concepts to use and what kinds of personnel are needed to 1un the operation. Additionally, the Microsoft Dotsmatt Initiative provides key points to address when building an Intemet operation from scratch. 28 4.2 Microsoft Technology Centers (MTCs): MTCs are areas designed for groups of entrepreneurs, Information Technology personnel, and businessmen for the rapid development. of robust e-commerce solutions. At these facilities, developers, entrepreneurs, and high-technology business persons use Microsoft Technology and the relevant knowledge to build enterprise solutions. The centers provide the essentials a team would need to develop an enterptise from the initial conception of the idea to launch. Microsoft provides essential equipment, support, and expe11ise, with an application of a ";best-practices" approach. These best practices have been tested before at MTCs, expediting the development progress and time to market. Laboratory sessions are designed to bring together an assortment of entrepreneurial individuals as they facilitate the development process using the latest Microsoft products. The MTCs offer customers wishing to capitalize on emerging Microsoft.NET technologies the service, infrastltlctme, and development environment to accelerate their projects and reduce thejr risk. The working laboratory is intended to help customers develop and test next-genera6on e-commerce technologies and demonstrate further the value of Windows platforms and other industry-standard systems for powering ebusiness. 4.3 Impact of XML: XML represents a more general way of defining text-based/ documents compared to Hypertext Markup Language (HTML). Both HTML and XML descend from Standard Generalized Markup Language (SGML). The greatest difference between HTML and XML is the flexibi lity of the allowable tag found in XML. An XMLbased document can define its own tags, in addition to including a set of tags defined by a 29 third-party. This ability may become very useful for those applications that need to deal with very complex data structures. An example of an XML-based language is the Wireless Markup Language (WML). WML essentially allows text pm1ions of Web pages to be displayed on wireless devices, such as cellular phones and personal digital assistants (PDAs). WML works with the Wireless AppHcation Protocol (W AP) to deliver this content. WML is similar to HTML but does not require input devi ces such as a keyboard or mouse for navigation. In the case of a PDA thal requests a Web page on the Intemet, a WAP gateway receives the request, translates it, and sends it to the appropriate Internet server. In response, the server replies by sending the requested WML document. The WAP gateway parses this document's WML and sends the proper text to the PDA. This introduces the element of device portability. 4.4 Microsoft.Net Initiative: Microsoft announced a new generation of software called Microsoft .NET. This software is intended to enable every developer, business, and consumer to benefit from the combination of a variety of new Internet devices and programmable Web services that characte1ize NGI. Microsoft is trying to create an advanced new generation of software that wiiJ drive NGI. This initiative is called Microsoft.NET and it.s key purpose is to make information available at any time, in any place, and on any device. 4.5 Microsoft BizTalk 0 1·chestration: For IEE purposes, BizTalk Server 2000 is the considered a nex t-generation software that plays an important role in forming the infrastructure and tools for building successful e-commerce communities. The core of 30 BizTalk Server offers business document routing, transformation, and tracking infras tructure that is mles based. BizTalk Server offers many services that allow for quickly building dynamic business processes for smooth integration of applications and business partners while utilizing pubJic standards to ensure interoperability. Essentially, BizTalk server provides a method to build dynamic business processes quickly. 4.6 Back-end Configurations Using Microsoft Technology: In the design of the backend of a website, special considerations must be given to security. This is done by providing a kind of safety buffer from the greater world of the Internet using a demiUtarized-zone (DMZ) strategy. The components of a DMZ such as the firewall, the front-end network, the back-end nelwork, and the secure network function as a security buffer from the outside world. 4.7 Rapid Economic Justification (RE.fl: The REJ framework makes it possible for IT and business executives to demonstrate how specific investments in IT will eventually benefit the business, ensuring in the process that the IT projects are aligned with the specific business strategies and priorities. IT investments play a critical role in Internet enterprises. Important decision-making at the early stages of any venture does require an effective methodology to identify the best strategic IT investments. Leaders in the upper echelon of organizations such as CEOs, CTOs, and CFOs are being overwhelmed with complex information. REJ may prove to be a reliable method to quickly evaluate the true value worth and potential of a company by taking into consideration its intangible IT assets. 31 In the past, companies developed metrics for the valuation of IT investments on the basis of cost improvements. Metric methodologies have focused on Total Cost of Ownership (TCO), whereas the strategic role of IT in boosting new opportunities for business has been largely ignored. Understandably, the benefits of IT can be traced to ways of measuring business value the traditional way. Unfortunately, current business practices are not necessarily adequately equipped to handle the complexities of the New Economy. Although the economic justification of IT projects has been researched extensively in the past decade, the problem is that these metiJods and techniques require too much data-crunching power and time to prepare. These unwieldy research techniques need to be replaced by a new and practical approach to quantify swiftly and accurately the true value of IT investments. 5 MARKETING AND CUSTOMER RETENTION 5.1 Online Marketing: The Internet provides marketers with new tools and convenience that can considerably increase the success of their marketing efforts. An Internet marketing campaign such as advertising, promotions, public relations, partnering and Customer Relationship Management (CRM) systems are all an integral prut of the marketing process. Table 6 describes the various techniques at the marketer's disposal when using the Internet as the medium of customer information delivery [19]. 5.2 CRM Systems: CRM is a general but systematic methodology using both business and technological techniques to maintain and grow a business's customer base. CRM systems enable a business to keep detaj led records on the activity of its c ustomers 32 by using new, sophisticated tracking systems on the Internet. Table 7 shows various areas where CRM technology and CRM business techniques can assist in managing a customer base [19]. 5.3 Web Design Technology Example: Dreamweaver Technology: Macromedia Dreamweaver is Web technology for building websites on the Internet without the need for programming directly in HTivlL [21]. Also, Web designers are easily able to create Web-based leaming content with Dreamweaver 4.0. A Web designer has the ability to create site maps of the website that can be easily maintained and enhanced. This is a very popular technology available on the market that can be used to make professional quality websites for marketing and promotional purposes. 5.4 Web Enhancement Technology Example: Flash Technology: Macromedia Flash is a multimedia technology for applications on the Web. This technology gives the user, especially one not artistically talented, the ability to develop interactive animations that can look quite impressive. A flash movie can be embedded into a Web site or run as a standalone program, and Flash is compatible with Dreamweaver. Flash movies can be made with sound and animation, so it is useful as a software tool to produce demonstrations at the user-interface. Flash can be used on CD-ROMs and allows for the construction of cross-platform audio/video animations and still jmages. 33 \ 6 SUMI\-IARY TABLES We would like to reiterate emphasis areas for Electronic Enterprise as listed in the introduction of this module. These are a) hardware (mechanisms associated with physical world), b) software (mechanisms associated with computational world), c) netware (mechanisms associated with communications), and d) peopleware (mechanisms associated with human element) [23, 24]. Following tables provide a useful Jist in all these areas. For convenience, we include all summary tables in following order: Table 1 Enterprise Maturity Levels Table 2 Web Business Models Table 3 Electronic Transactions Table 4 NGI Participating Agencies Table 5 Occupational Roles in lEE Table 6 Marketing Techniques on the Internet Table 7 Customer Relationship Management 34 Table 1 Enterprise Maturity Levels Levels Focus Activity Coordination Infrastructure 5. Whole Human-society Process Self-directed teams Long-term oriented; in engineering dominate orientation, harmony with methodology workplace; toLal personal mastery, nature, people institutionalized; alignment; open, heavy investments routinely do the Flexible and honest in IT, continuous right things: predictable communication improvement change is second process, right the channels institutionalized nature first time, value- throughout adderl activities only 4. Wise Stakeholders and Process monitored Organjzational Organi:z.ation community automatically for structure based on competency oriented in high performance; cross-trained case management; harmony with dominated by teams; vision continuing community; value-added al igned with the education; team-people routinely activities; high needs of the based structure; doing things right. degrl:e of society tenm-oriented HR Changes are concurrency; few policy planned and handoffs mannged 3. Mature Customer oriented; Process defined Vision defined Integrated customer's needs and is measured with extensive capacity, are anticipated; buy-ins, multi- con sol ida ted people are proud to functional project function; work here teams exist; investment in participatory training and work culture with force planning; managers as flattened coaches organization 2. Stable Competition- Process under Internal focus, Short-term focus, oriented reactive statistical control; control oriented, fragmented bench-marking as functional division capacity, little IT, a result of reaction, hierarchical, inflexible process, difficult to get has many information, no handoffs and a formal HR policy substantial number of non-value-added tasks I . Ignorant Disoriented- Fire-fighting Ad- No clear vision, Don' t know where chaotic hoc, unpredictable, resources exist fragmented Rumor mill rampant 35 e-Business Model Storefront Model Auction Model Portal Model Dynamic Pricing Model Comparison Pricing Model Demand-Sensitive Pricing Model Table 2 Web Business Models Description The~ storefront model is what many persons think of when they bear the word ebusiness. The storefront model combines transaction processing, security, online payment and information storage to enable merchants to sell their products on lhe web. This is a basic form of e-commcrce where the buyer and seller interact directly. To conduct storefront c-commerce, merchants need to organize an online catalog of products, take orders through their Web sites, accept pnyments in a secure envi ronment, send merchandise to customers, and manage customer data. One of the most commonly used e-commercc enablers is the shopping cart. This order-processing technology allows customers to accumulate items they wish to buy as they continue to shop. www.amazon.com is a good example. Forrester Research reveals that an estimated $3.8 billion will be spent on online person-to-person auctions in the year 2000 alone. This number is expected to rise to $52 billion for Business-to-Business (B2B) auctions. Usually auction sites act as forums through which Internet users can log-on and assume the role of either bidder or seller. As a seller, you are able to post an item you wish to sell, the minimum price you require to sell it, your item, and a deadline to close the auction. As a bidder, you may search the site for availability of the item you are seeking, view lhe current bidding activity and place a bid. They usually do not involve themselves in payment and delivery. www.ebay.com is a good example. Portal sites give visitors the chance to find almost everything they are looking for in one place. They often offer news, sports, and weather, as weU as the ability to search the Web. Search engines are h01i zontal portals, or portals that aggregate information on a broad range of topics. Yahoo! at www.yahoo.com is an example of a horizontal portal. America Online (AOL) www.aol.com is an example of a vertical portal because it is a community-based site. The Web has changed the way business is done and the way products are priced. Companies such as Priceline (www.pricelinc.com) and Imandi (www.imandi.com) have enabled customers to name their prices for travel, homes, automobiles, and consumer goods. The name-your-price model empowers customers by allowing them to choose their price for products and services. The comparison pricing model allows customers to polJ a variety of merchants and find a desired product or service at the lowest price (i.e. www.bottomdollar.com). The Web has enabled customers to demand bener, faster service at cheaper prices. It has also empowered buyers to shop in large groups to achieve a group rate (i.e., www.rnercata.com). Customers become loyal to Mercata because it helps them save money. 36 e-Business Model Bartering Model Advertising Model Procurement Model B2B Service Provider Model · Online Trading Model Online Lending Model Online Recruiting Model Online Travel Service Model TabJe 2 (Continued) Description A popular method of conducting e-business is bartering, offering one item in exchange for anotiier. If a business is looking to get rid of an overstocked product, iSolve ~isolve.com) can help sell it PotenHal customers send their pricing pre ferences to the merchant who evaluates the offer. Deals are often part barter and part cash. Examples of items typically bartered are overstocked inventory items, factory surplus, and unneeded assets. Forming business models around advertising-driven revenue streams is the advertising model. Television networks, radio stations, magazines, and print media usc advertising to fund their operations and make a profit. www.Iwon.com is a portal site that rewards users with raffle points as they browse the site's content. www.freemerchant.com offers free hosting, a free store builder, a free shopping cart, free traffic logs, free auction tools and all the necessary elements for running an e-commerce storefront. Frccmerchanl makes money from its strategic partnerships and referrals. The procurement model means acquiring goods and services with effective supply chain management via a B2B Exchange. ICG Commerce Systems (www.icgcommerce.com) is a site that enables businesses, customers, suppliers, purchasers, and any combination of these to interact and conduct transactions over the Internet. The system supports B2B, B2C, and all variations of these models. · B2B service providers make B2B transactions on the Internet easier. These e-businesscs help other businesses improve policies, procedures, customer service, and general operations. Ariba (www.ariba.com) is a B2B service provider. The online trading model is essentially securities trading on the Internet. Trading sites allow you to research securities and to buy, sell, and manage all of your investments from your desktop; they usually cost less. Charles Schwab (www.schwab.com) is a notable example. Companies are now making loans online. E-loan (www.eloan.com) offers creditcard services, home equity loans, and the tools and calculators to help you make educated borrowing decisions. Recruiting and job searching can be done effectively on the Web whether you are an employer or a job seeker. Refer.com (www.refer.com) rewards visitors for successful job referrals. Web surfers can search for and arrange for all their travel and accommodations online, and can often save money doing so. Cheaptickets (www.cheaptic kets.com) .is a similar site that helps customers find discount fares for airl.ine tickets, hotel rooms, cruise vacations and rental cars. 37 e-Business Model Online Entertainment Model Energy Distribution Model Braintrust Model Online Learning Model Click-and-Mortar Model Table 2 (Continued) Description The entertainment industry has recognized this and has leveraged its power to sell movie tickets, albums and any other entertainment-related content they can fit on a Web page. ICast.corn (www.icast.com) is a multimedia-rich entertainment site. A number of companies have set up energy exchanges where buyers and sellers come together to corrununicate, buy, sell, and distribute energy. These companies sell crude oil, electricity, and the products and systems for distributing them. Altranet (_www.altranet.com) also sells energy commodities. Companies can buy patents and other intellectual property online. Yet2 (www.yct2.com) is an e-business designed to help companies raise capital by selling intellectuaJ property such as patents and trademarks. Universities and corporate-training companies offer high-quality distance education directly over the Web. Click2learn ~www.click2 1earn.com) has created a database of products and services to elp mdtvtdunls and companies fi.nd the education they need. Brick-and-mortar companies who wish to bring their businesses to the Web must determine the level of cooperation and integration the two separate entities will share. A company that can offer its services both offline and o nline is called click-and-mortar, such as Barnes & Noble (www.bn.com). 38 Electronic Transaction T e Credit Card Transactions E-wallets Debit cards Digital Currency Table 3 Electronic Transactions Descrjption Merchant must have a merchant. account with a bank. Specialized Internet merchant accounts have been established to handle online credit card transactions. These transactions are processed by banks or third-party services. To faci litate the credit card process, many companies are introducing electronic wallet services. E-wallets allow you to keep track of your billing and shipping information so it can be entered with one click. Banks and businesses are also creating options for online payment that do not involve credit cards. There are many forms of digital currency; digital cash is one example. It is stored electronically and can be used to make online electronic payments. Digjtal cash is often used with other payment technologies such as digital wallets. Digital cash allows people who do not have credit cards to shop online, and merchants accepting digital-cash payments avoid creditcard transaction fees. 39 Examples Companies like Cybercnsh (www.cybercash.com) and ICat (www.icat.com) enable merchants to accept credit card payments online like www.Charge.com. www. visa.com offers a variety of ewallets. Entrypoint.com offers a free, personalized desktop toolbar that includes an e-wallct to facltitate one click shopping at its affiliate stores. In order to standardize e-wallet technology and gain wider acceptance among vendors, Visa, Mastercard, and a group of e-wallet vendors have standardized the technology with the Electronic Commerce Modeling Language (ECML), unveiled in June 1999 and adopted by many online vendors. Companies such as AroeriNet allow merchants to accept a customer's checking-account number as a valid form of payment. AmeriNet provides authorization and account settlement, handles distribution and shipping (fulfi11ment), and manages customer service inquiries. E-Cash Technologies (www.ccas.b.com) is a secure digitalcash provider that allows you to withdraw funds from your traditional bank account. Gift cash is another form of digital currency that can be redeemed at leading shopping sites. Web. Flooz (www.Jlooz.wm) is an example of gift currency. Some companies offer points-based rewards. www.beenz.com is an international, points-based currency system. Electronic Transaction Peer-to-peer Smart Cards Micropaymenls Table 3 (Continued) Description Peer-to-peer transactions allow online monetary transfers between consumers. A card with a computer chip embedded on its face is able to hold more information than an ordinary credit card with a magnetic strip. There are contact and contactless smartcards. Similar to smart cards, ATM cards can be used to make purchases over the Internet. Merchants must pay for each credit card transaction that is processed. The cost of some items could be lower than the standard transaction fees, causing merchants to incur losses. Micropayments, or payments that generally do not exceed $10.00, offer a way for companies offering nominal.ly priced products and services to generate a profit. 40 Examples cCash runs a peer-to-peer payment services that allows the transfer of digital cash via email between two people who have accounts at eCashcnablcd banks. Pay Pal offers a digital payment system known as X payments. PayPal allows a user to send money to anyone with an email nddress, regardless of what bank either person uses or whether the recipient is pre-registered with the service. EConnect has technology in the form of a device that connects to your computer and scrambles financial data, making it secure to send the data over the Internet. EpocketPay is another product developed by eConnect that allows a consumer to make secure purchases from the ePocketPay portable device. This device acts as a cell phone with a card reader built into it and will allow you to make secure purchases anywhere. Millicent js a micropayment technology provider. Millicent handles all of the payment processing needed for the operation of an e-busi ness, customer support, and distribution services. Millicent's services are especially useful to companies that offer subscription fees and small pay-per-download fees for digjtal content. c-Billi ng Electronic llill Presentment and payment (EllPP) offers the ability to present a company's bill on multiple platforms online. Payments arc generally electronic transfers from consumer checking accounts. 41 The Automated Clearing House (ACH) is the current method for processing electronic monetary transfers. Table4 NGI Participating Agencies _A~c~ro~t~1Y~n_l_ _~ E_x~p_a_n_si~n --- ~ --- ~--~ --- DARPA Defense Advnnced Research Projects Agency DOE Department of Energy (beg inning in PY 1999) NASA National Aeronautics and Space Administration NIH National Insti tutes of Health NIST National Institute of Standards and Tec hnology NSF National Science Foundation 42 Occupation Entrepreneur e-Commerce Program Manager Enterprise Architect Business and Infonnation Architect Table 5 Occupational Roles in illE Descdptjon An entrepreneur on the Internet is usually the person with the initial idea for the entire business and is involved in its early stages of inception before official management takes over. e-Commerce Program Managers are involved in enterprise-wide ecommerce initiatives and projects, managing e-cornmerce integration and overall business and technology architecture and infrastn1cture. Usually, they arc senior-level line managers who are effective at uniting the business and technology front by coordinating units within an organization and across the extended enterprise. Enterprise Arc hitects are involved in the definition, alignment, and refinement of the overall ente rprise architecture. Their responsibilities include seeing to it that many of the tasks of program management are can·ied out properly. More important, they must provide guidance so individual projects can make optimal use of infrastructure resources for e-Cornmerce. A balancing act between business requirements and tcchnologicnl capabilities is accomplished through their efforts . Enterprise Architects have a duty to identify the requirements, goals, and constraints of the project. They allocate responsibilities for each of the architectural elements. They are also responsible for lhe coordination of the modeling and design activities for the overall enterprise architecture. They are the chief e-commerce architects because they coordinate the work information, infrastructure and application architects. All architects and modelers should be completely capable in design patterns common to the many facets of business and technology. The design pattern movement has affected all aspects of analysis, design, and implementation of componentbased systems. Design patterns are the reusable material of architecture and have an important role in the complex distributed information systems lhat are conceived and developed today. Business and Information Architects have business domain knowledge, including business processes and logical information structures. They coordinate the work of business and technology analysts and modelers who develop abstract representations or business object models of the subjects, rules, roles, events, tasks, activities, and policies of the business domain. Application-neutral models that are built enable the reuse of business engineering analysis and design patterns and artifacts 43 Occupation Infrastructure Architect Application Architect Humru1 Factors Engineer Business Manager Internet Commerce Architect Table 5 (Continued) Description Infrastructure Architects identify the technical services required of the technology infrastructure to empower and support the logical busi ness and information architecture. They evaluate existing infrastructure services, s\~l ect those appropriate to a given project and acquire (via build or buy) new components needed in the infrastructure. They oversee the work of technical specialists in modeling the service architecture of the technical infrastmcturc. They maintain the technical components of the development repository. Application Architects coordinate the business process modeling activities across multiple projects and business domains. They coordinate the work of domain modelers and maintain the repository of business and component models. They evaluate existing business component services, sclectthose appropriate to a given project and (via build or buy) new components needed in the evolving business model. They maintain the business application components of thC development repository. Most importantly. tl1ey guide solution developers in blending the business object model with the infrastruchJre services needed to implement the models in an e~com merce platform. Human Factors Engineers are needed to design the next generation of user interfaces. While the graphical user Interface (GUD is recognized as the enabler of wide-spread personnl computing, task centered user interfaces provide assistance to end-users and can be a boon to productivity in the world of e-commerce. E-commerce transactions can involve a multitude of complex steps and processes. Well-designed user interfaces can help navigate and guide the user through these tasks, keeping track of the progress, and picking up where users leave off when transactions span multiple sessions of work. The Business Manager is responsible for the business approach on the Internet, creating and operating the Internet presence for the business, deciding what products and services are sold online, determining pricing, and establishing the key business relationships needed lo make a venture successful. This is primarily a business role, with particular attention paid to the success of the online business and bottom line. The Internet Commerce Architect is generally a systems analyst who turns the business requirements into a system design that incorporates the creation and management of content, the tnmsaction processing, fulfillment, and technical aspects of customer service 44 Occupation Solution Developer Content Designer Content Author Implementor Database Administrator Internet Sales and Marketing Customer Service Representative T~lble 5 (Continued) Description Solution Developers are application developers. They develop the use cases for the specific application at hand, compose solutions through extensive use of business object models, and use repositories. They assemble application components to implement c-commercc application. Unlike conventional programmers or programmer/analysts, they do not build or pmgram components. Instead, they assemble or glue together business solut ions from prefabricated components. They use highly integrated development environments (IDEs) such as IBM's VisuaiAge, Symantec's Visual Caf6, Sybase's PowcrJ, and Inprise's Jbuilder. Emerging Computer Assisted Software Engineering (CASE) tools and related methods will likely appear that tighten the link between business modeling and software development. Tools for understanding and managing business processes, such as Inte11icorp's LiveModel allows solution developers to build logical business that can automate the configuration and management of the SAP/R3 ERP system. The Content Designer is responsible for the look and feel of an Internet commerce system, including the graphic design, page layout, and user experience. The Content Author creates or adapts product information into a form that can be used for internet commerce, working within the design laid out by the content designer. The Impleme::ntor is responsible for creating any programs or software extensions needed to make the Internet commerce system work. For example, an Implementor might write the software or construct an ASP page using Drumbeat 2000 that takes product information from a database and dynamically renders it into a Web page. In the case that a database is used in the back-end, the Database Administrator (DBA) manages the creation and operation of the database to ensure its reliability, integrity, and performance. The Sales and Marketing team is responsible for focused efforts in promoting Internet-based commerce. Customer Service Representatives answer questions about products, assist buyers with registration or the purchasing of goods and services. 45 Occupation Component Developer Operations Manager System Supervisor System Administrator Security Officer Fulfillment Agent CPO Internet Lawyer Internet Accountant Table 5 (Continued) Description Component Developers usually build components in the form of coding projects. They are masters of component technology and know the intricacies of composition, delegation, and object-oriented systems analysis and design. They are proficient in component development languages (such as Java and C++), modeling standards (such as UMLand XMI), and distributed computing platforms (such as CORBA, DCOM, EJB). They understand and think in terms of architectural design patterns. In the meanti me, they will close the gap between business requirements and available components. Component developers must be highly qualified software engineers since quality'components do not just happen. They are carefully constructed using quality soflware engineering disciplines. Component Developers, therefore, must be highly trained specialists and masters of software quality processes such as CMM and ISO, as well as masters of component-based development methods. The Operations Manager is responsible for managing all service activities for the Internet commerce system. The System Supervisor manages the system staff. The System Administrator is responsible for the technical operations of the computer systems and networks. The Security Officer ensures that appropriate security measures have been taken in the design and implementation of the Internet commerce system. The Fulfillment Agent is responsible for shipping and handling of physical goods or delivery of services. In the case of digital goods, the fulfillment agent is responsible for overseeing the operation of the fulfillment system. The Chief Privacy Officer is io charge of measures for ensuring the security of vital company information, such as customer credit card numbers remains secure within the company network. An Internet Lawyer is a legal expert for Internet fu nctions. The .importance of this position cannot be overstated, because new laws and regulations could ki ll a company without legal assistance, prevention, or intervention. The Internet Accountant is responsible for ensuring that the proper accounting procedures have been followed for Internet-based transactions. 46 Technique Domain name FAQ Forum Networking Faci litation Promotions c-Business advertising Pay-per-click Pay-per-lead Pay-per-sale Webcasting Interactive Advertising Public Relations and press releases Trade shows Table 6 Marketing Techniques on the Internet Description The Universal Resource Locator (URL) represents the address of the domain name, which must be chosen with care because it reflects the company's values immediately and connotes immediate meaning to customers with its first impression. One can purchose a domain name at www.networksolutions.com. A frequently asked questions (FAQ) section contributes to a userfiiendly site. An onli ne forum on the website enables customers to congregate at a pre-de~ign at cd place on the site to post comments and to share ideas. This promotes site activi ty. It is important to make it easy for the customer to recommend a site to a friend. This can be accomplished with a quick button that brings up an email exchange. c-Business promotions can attract visitors to your s ite and can influence purchasing. Netcenlives.com is a company that can provide your business with customer reward programs. P ublicizing through traditional channels such as television slots, movies, newspapers, and magazines is effective. Pay-per-click is a mode of operation that calls for paying the host according to the number of click-throughs to a site. Pay-per-lead is a mode of operation that pays the host for every lead generated from the advertisement. Pay-per-sale is a mode of operation that pays the host for every sale resulting from a click through. Webcasting is a broadcasting technique on the Web that uses streaming media to broadcast an event over the Web. Interactive Advertising involves consumers in the advertising campaign. An example is WebRIOT, a game show on MTV. The game is aired on television, and viewers can join in the game at the same time by playing online. Public Relations (PR) and press releases keep customers and your company's employees current on the latest information about products, services, and intemal and external issues such as company promotions and consumer reactions. Trade shows arc excellent opportunities to generate site interest by speaking at conferences, which increases brand awareness 47 Table 7 Customer Relationship Management CR.M:Area Handling Sales tracking Transaction support Data-mining Call center Log-file analysis Cookie Customer registrntion Personalization One-to-one marketing Onsite Search engine Registering with Internet search engines Partnering Afffiiate Programs Culture management Description Handling is essentially the maintenance of out-bound and in-bound calls from customers and service representatives. Sales tracking is the process of tracing and recording all sales made. Transaction support entails technology and personnel used for conducting transactions. Data-mini ng is a wny to analyze information collected from visitors. Data-mining uses algorithms and statistical tools to find patterns in data gathered from customer visits. A call center gathers customer-service representatives who can be reached by an 800 number or through email, online text chatting, or real-time voice communications. A log-file analysis is a useful way to keep track of your visitors in tenns of site visits, including each visitor's location, IP address, time of visit, frequency of visits, and other key indicators. A cookie is a technology that keeps a profile on each visitor. Customer registration is an excellent method to create customer profiles because visitors fi ll out a form with personal information. Personalization technology can help a company understand the needs of its customers and the effectiveness of its website, thereby catering to the whims of the customer. One-to-one marketing such as e-mails confirms purchases and offers new products, showing customers that the business appreciates their patronage. Onsite Search engines allow people to find information relative to a subject of interest amidst the large amounts of information available on a personal website. Registering with Internet search engines is important because there are reportedly over 400 se::arch engines in usc on the Internet. This process makes a website known to the world by submitting the website as a searchable domain name in a sea of domain names. Partncring is a way of forming a strategic union with another company. Generally, legal contracts are usually written to define the relationship in a wf'ly to help a company provide customers with complimentary services and product<;. An Affiliate Program is an agreement between two parties that one will pay the other a commission based on a designated consumer action. Affi liate programs establish new income streams for companies and individuals that host the advertising affili ate websites. Culture management is the ability to understand and cater lo a target audience's patronage and culture, especially in global enterprises. 48 LIST OF REFERENCES [1] 0. Aktunc, ";The Role of Component Technologies on Enterprise Engineering,"; Masters Thesis, Department of Electrical and Computer Engineering, University of Alabama at Birmingham, 2002. [2] D.H. Liles, M.E. Johnson, L.M. Meade, and D.R. Underdown, ";Enterprise Engineering: A Discipline?"; Society for Ente1prise Engineering Conference Proceedings, June 1995. [3] L. Whitman, Enterprise Engineeiing IE8801 class webpage, http://webs.twsu. edu/enteng, 2002. [4] W.D. Barnett and M.K. Raja, ";Object-Oriented Enterprise Engineering,"; http:/ /webs. twsu .edu/enteng/papers/OOEE. pdf, 1999. [5] J. Orr, ";Enterprise Engineedng Modeling,"; http://www.cadinfo.net/editorial!eem. htm, 2002. [6] H. Eriksson and M. Penker, Business Modeling with UML, New York: Wiley, 2000. [7] G. Herzum and 0. Sims, Business Component Factory, New York: Wiley, 2000. [8] ";Enterprise Design and Engineering,"; http://www.eil.utoronto.ca/ent-eng/, 2002. [9] M. Segal, M. N. Tanju, 0. Aktunc, and M. M. Tanik, ";Strategy Formulation for E-Business ,"; in The fifth World Conference on Integrated Design & Process Technology, 2000, Proceedings CD. [10] E.M. Roche, ";Managing Information Technology in Multinational Corporations,"; Macmillan Publishing Company, New York, 1992. [11] C. Chandra and A.V. Smirnov, ";Ontology-Driven Knowledge Integration for Consumer-Focused Smart Companies,"; Proceedings of the Twelfth Annual Conference of the Production and Operations Management Society, POM-2001, Orlando FL, 2001. [12] G.J. Cross, ";Now e-Business is Transforming Supply Chain Management,"; Journal of Business Strategy, March/April, pp. 36-39, 2000. [13] S. Chincholikar, 0. Aktunc, and M.M. Tanik, ";TheN-Queens Test-Bed,"; Technical Report 2001-1 0-ECE-0 11, Department of Electrical and Computer Engineering, University of Alabama at Birmingham, 2001. [14] S. Davis and J. Botkin, ";The Coming of Knowledge-Bases Business,"; D. Tapscott, eds., Creating Value in the Network Economy, Boston: Harvard Business School Publishing, 1999. 49
This dissertation presents essays on two questions that have been receiving constantly increasing attention in economics over the last decades: (1) What is the role of psychological, emotional, social and cognitive factors in economic decisions? (2) How can economics incorporate social phenomena such as social norms and conventions, cultural identities and stereotypes, peer and neighborhood effects into its models? Chapter 1 presents a game theoretic market model that studies the potential influence of psychological attribute salience on consumer choice and market supply in competitive retail markets. Our essay shows that, in equilibrium, retailers strategically manipulate the attribute salience of their products in order to sell naive consumers a more profitable product than the consumer intended to buy when entering the store. Depending on parameter values, the retailer either sells a more expensive product of higher quality ("up-selling") or a cheaper product of lower quality ("down-selling"). In both cases, the retailer exploits comparisons with seemingly irrelevant products ("decoys") in order to increase the salience of the advantageous attribute (quality or price) of the product it aims to sell. The result holds under perfect retailer competition, is robust to the existence of sophisticated and rational consumers, and resonates with anecdotal evidence on psychological "marketing tricks" of retailers as well as with the experimental literature on so-called "context-effects." Chapter 2 explores the phenomenon of "spontaneous discrimination". Spontaneous discrimination refers to inefficient equilibria in dynamic matching games that are characterized by the seemingly arbitrary coordination of tolerant individuals on a group norm that generates reputational rewards for group members who restrict their interactions to partners of a certain color. To sustain such a norm, information about the color of immediate as well as historical partners has to be revealed to other members of the group. Only then do the reputational mechanisms bite. Chapter 2 develops a theoretical framework to study incentives for information disclosure and analyzes the circumstances in which individuals themselves reveal the color of partners (self-reports) and those in which observers do so (observer-reports). The essay shows that disclosure incentives depend on whether the market for partners is competitive. While incentives for disclosure do not exist in the non-competitive environment of the benchmark model, they can be created by extending the model to include competition. Competition results in one group benefiting from the discrimination of the other group. Individuals disclose information strategically to gain access to the group that benefits as well as to exclude others from it. Competition also generates incentives for groups to coordinate on a discriminatory norm in the first place. The model can rationalize the observation that individuals sometimes seek group status through discrimination and stigmatization and that groups frequently call for discriminatory rules against outsiders to secure its members access to profitable partnerships (e.g., jobs). Chapter 3 presents the results of an online-experiment on the question of whether electoral corruption undermines people's willingness to follow democratically elected rules of conduct. Rules concern the redistribution of income. We implement elections in which 100 participants ballot on whether there should exist a rule that asks for the sharing of private (experimental) income or a rule that asks for the opposite. After the election we observe participants' voluntary compliance with the elected rule. The study compares the number of subjects who comply with the rule after an unbiased election with the number of subjects who comply when, during the election, (1) subjects were asked to pay for their vote, (2) subjects were offered money for voting differently, (3) subjects with low household income were excluded from the ballot. In all three cases the data shows a strong and significant reduction in compliance with rules that ask for redistribution. We find no such effect with regard to compliance with the opposite rule ("don't redistribute"). The result suggests that compliance with prosocial rules is affected to a larger extent by corruption than compliance with antisocial rules. Earlier experiments could already demonstrate pure democracy effects in prosocial behavior, but did not deal with either corruption effects or antisocial rules. The study also examines the psychological mechanisms underlying the observed behavior: Treatment effects seem to be driven by intrinsic concerns about procedural aspects of the electoral mechanism, and are particularly prevalent among individuals who express high value for democratic institutions and low value for bribing and (political) lobbying in the real world. ; Diese Dissertation legt Aufsätze zu zwei Fragen vor, die in den letzten Jahrzehnten immer mehr Beachtung in der Volkswirtschaftslehre gefunden haben: (1) Welche Rolle spielen psychologische, emotionale, soziale und kognitive Faktoren in ökonomischen Entscheidungen? (2) Wie kann die Volkswirtschaftslehre soziale Phänomene wie soziale Normen und Konventionen, kulturelle Identitäten und Stereotypen, Peer-Group- und Nachbarschaftseffekte in ihre Modelle einbeziehen? Kapitel 1 untersucht, mithilfe eines spieltheoretischen Marktmodells, den möglichen Einfluss von psychologischer Attributsalienz auf das Kaufverhalten von Konsumenten und das Angebot von Einzelhändlern in kompetitiven Endkonsumentenmärkten. Der Aufsatz zeigt, dass im Gleichgewicht Händler die Attributsalienz ihrer Produkte strategisch manipulieren, um naiven Konsumenten nach Eintritt in das Geschäft ein profitableres als das vom Konsumenten ursprünglich bevorzugte Produkt zu verkaufen. Je nach Parameterwerten verkauft der Händler entweder ein qualitativ höherwertiges, jedoch teureres Produkt ("up-selling"), oder ein billigeres, jedoch qualitativ minderwertigeres Produkt ("down-selling"). In beiden Fällen nutzt der Händler den Vergleich zu scheinbar irrelevanten Produkten ("Decoys"), um die Salienz des vorteilhaften Attributs (Qualität oder Preis) des zu verkaufenden Produkts zu erhöhen. Das Ergebnis hät im perfekten Wettbewerb, ist robust gegenüber der Existenz nicht-naiver und rationaler Konsumenten, und ist im Einklang mit qualitativer Evidenz zu psychologischen "Marketingtricks" von Einzelhändlern, sowie mit der experimentellen Literatur zu sogenannten "Kontexteffekten." Kapitel 2 beschäftigt sich mit dem Phänomen der "spontanen Diskriminierung". Das Phänomen bezieht sich auf Gleichgewichte in dynamischen Matching-Spielen, die durch die scheinbar willkürliche Koordination von toleranten Individuen auf eine diskriminierende Gruppennorm gekennzeichnet sind, welche mittels endogener Reputationseffekte die ausschließliche Interaktion mit Partnern einer bestimmten Farbe belohnt. Um eine solche Norm aufrechtzuerhalten, muss die Farbe von unmittelbaren und historischen Partnern anderen Mitgliedern der Gruppe offenbart werden. Nur dann greifen die Reputationsmechanismen. Kapitel 2 entwickelt einen theoretischen Rahmen, um Anreize für die Offenlegung solcher Information zu untersuchen, und analysiert, unter welchen Umständen Individuen selbst die Farbe ihrer Partner offenlegen (Selbstberichte) und unter welchen Umständen Beobachter dies tun (Beobachterberichte). Der Aufsatz zeigt, dass Offenlegungsanreize davon abhängen, ob der Markt für Partner kompetitiv ist. Während im nicht-kompetitiven Markt des Benchmark-Modells keine Anreize zur Offenlegung existieren, können diese durch eine Erweiterung des Modells um Wettbewerb geschaffen werden. Wettbewerb führt dazu, dass eine Gruppe von der Diskriminierung der anderen Gruppe profitiert. Individuen nutzen die Informationsweitergabe in diesem Fall strategisch, um einerseits selbst Zugang zu der bevorzugten Gruppe zu erhalten, und andererseits, um andere aus dieser Gruppe auszuschließen. Auf Gruppenebene schafft Wettbewerb zudem Anreize, sich von vornherein auf eine diskriminierende Norm zu koordinieren. Das Modell kann die Beobachtung rationalisieren, dass Individuen manchmal versuchen, durch Diskriminierung und Stigmatisierung die Zugehörigkeit zu einer Gruppe zu signalisieren, und dass Gruppen häufig diskriminierende Regeln gegen Außenstehende fordern, um ihren Mitgliedern den Zugang zu profitablen Partnerschaften (z.B. Arbeitsplätzen) zu sichern. Kapitel 3 präsentiert die Ergebnisse eines Online-Experiment zu der Frage, ob Wahlkorruption die Bereitschaft im Volk untergräbt, demokratisch gewählten Verhaltensregeln zu folgen. Die im Experiment untersuchten Verhaltensregeln betreffen die Umverteilung von Einkommen. Wir implementieren Wahlen, in denen jeweils 100 Teilnehmer abstimmen, ob es eine Verhaltensregel geben soll, die dazu auffordert, privates (experimentelles) Einkommen mit anderen zu teilen, oder ob es eine Regel geben soll, die das Gegenteil fordert. Nach der Wahl beobachten wir die freiwillige Einhaltung der gewählten Regel. Die Studie vergleicht die Anzahl an Personen, die sich nach einer unbeeinflussten Wahl an die Regel halten mit der Anzahl an Personen, die sich an die Regel halten, wenn während der Wahl (1) Teilnehmer dazu aufgefordert wurden, Geld für ihre Stimme zu zahlen, (2) Teilnehmer Geld angeboten bekamen, um ihre Stimme zu ändern, (3) Teilnehmer mit einem geringen Haushaltseinkommen von der Wahl ausgeschlossen wurden. Die Daten zeigen in allen drei Fällen einen starken, signifikanten Rückgang bei der Einhaltung von Regeln, die eine Umverteilung fordern. Die Einhaltung der gegenteiligen Regel ("verteile nicht um") ist von diesem Effekt nicht betroffen. Das Ergebnis deutet darauf hin, dass die Einhaltung von prosozialen Regeln stärker von Korruptionseffekten beeinflusst ist als die Einhaltung von nicht-prosozialen Regeln. Frühere experimentelle Studien konnten bereits reine Demokratieeffekte bei prosozialem Verhalten nachweisen, beschäftigten sich jedoch weder mit Korruptionseffekten noch mit nicht-prosozialem Verhalten. Die Studie untersucht auch die dem beobachteten Verhalten zugrundeliegenden psychologischen Mechanismen: Die Treatmenteffekte scheinen von intrinsischen Bedenken hinsichtlich der prozeduralen Aspekte des Wahlmechanismus getrieben zu sein und finden sich vor allem bei Individuen, die demokratische Institutionen hoch sowie Bestechungsversuche und (politische) Lobbyarbeit in der realen Welt gering schätzen.
The aim of this study is to understand the corporate taxpayers' perceptions about the enactment of Government Regulation No.23 of 2018. This research use case study method and analyze 10 taxpayers' perceptions based on interview. Findings reveal that the registration process is running smoothly. The online e-billing making process is very easy, the obstacle is interference on the system. Simple payment procedures that do not complicate. Payment at once with submits the report provides convenience. Tax payments do not disturb business entities' production and trade process. The imposition of tariff does not see the taxpayer's ability, so it did not provide tax justice. Government Regulation No.23 of 2018 provides tax convenience and fulfill economic requirement, but did not provides tax justice.Keywords: Government Regulation No.23 of 2018, tax convenience, economic requirement, tax justice REFERENCESAprilyanti. (2018). Analysis of Individual Taxpayer's Perception on Implementation of Government Regulation No.46 of 2013 in Pontianak City. Pontianak: Universitas Tanjungpura, Indonesia.Aritonang, J. (2015, May 13). Badan Pendidikan dan Pelatihan Keuangan Kementerian Keuangan. Retrieved March 2019, from https://bppk.kemenkeu.go.id/id/publikasi/artikel/167-artikel-pajak/21149-pengertian-peredaran-bruto-pada-pasal-31e-undang-undang-pphAwaluddin, I., & Tamburaka, S. (2017). The Effect of Service Quality and Taxpayer Satisfaction on Compliance Payment Tax Motor Vehicles at Office One Roof System in Kendari. The International Journal of Engineering and Science (IJES), 6 (11), 25-34.Direktorat Jenderal Pajak. (n.d.). Retrieved March 2019, from sse.pajak.go.id/Direktorat Jenderal Pajak. (n.d.). Retrieved March 2019, from sse3.pajak.go.idDirektorat Jenderal Pajak. (n.d.). Retrieved March 2019, from djponline.pajak.go.idDirektorat Jenderal Pajak. (n.d.). Retrieved March 2019, from pajak.go.idDirektorat Jenderal Pajak. (2000). Keputusan Direktur Jenderal Pajak No. KEP-536 / PJ. / 2000 tentang Norma Penghitungan Penghasilan Neto Bagi Wajib Pajak yang Dapat Menghitung Penghasilan Neto dengan Menggunakan Norma Penghitungan.Direktorat Jenderal Pajak. (2015). Surat Edaran Direktur Jenderal Pajak No. SE-02 / PJ / 2015 tentang Penegasan atas Pelaksanaan Pasal 31E Ayat (1) UU Nomor 7 Tahun 1983 tentang Pajak Penghasilan Sebagaimana telah Beberapa Kali Diubah Terakhir dengan Undang-Undang Nomor 36 Tahun 2008.Fatmawati. (2015). Pengaruh Pemahaman Wajib Pajak atas PP No.46 Tahun 2013 dan Implementasi Self Assessment System Terhadap Kepatuhan Wajib Pajak dengan Persepsi Wajib Pajak sebagai Variabel Moderasi (Studi Empiris Pada Pelaku UMKM Kerajinan Gerabah Kasongan). Yogyakarta: Universitas Yogyakarta, Indonesia.Gunarto, E. (2018, June 29). Forum Pajak Indonesia. Retrieved March 2019, from https://forumpajak.org/pph-final-umkm-perbyarat-pp-46-tahun-2013-dengan-pp-23-tahun-2018/Isroah. (2013). Penghitungan Pajak Penghasilan Bagi UMKM. Jurnal Nominal 2 (1), 64-88.Julianti, L. N. (2014). Pengaruh Suasana Toko (Store Atmosphere) Terhadap Minat Beli Konsumen pada Toserba Nusa Permai di Kecamatan Nusa Padina. Jurnal Pendidikan Ekonomi, 4 (1).Kementerian Hukum dan Hak Asasi Manusia. (2008). UU No.20 Tahun 2008 tentang Usaha Mikro Kecil dan Menengah (UMKM).Kementerian Hukum dan Hak Asasi Manusia. (2010). Government Regulation No.94 of 2010 tentang Perhitungan Penghasilan Kena Pajak dan Pembayaran Pajak Penghasilan.Kementerian Hukum dan Hak Asasi Manusia. (2013). Government Regulation No.46 of 2013 tentang Pajak Penghasilan atas Penghasilan dari Usaha yang Diterima atau Diperoleh Wajib Pajak yang Memiliki Peredaran Bruto Tertentu.Kementerian Hukum dan Hak Asasi Manusia. (2018). Government Regulation No.23 of 2018 tentang Pajak Penghasilan atas Penghasilan dari Usaha yang Diterima atau Diperoleh Wajib Pajak yang Memiliki Peredaran Bruto Tertentu.Kementerian Keuangan RI. (2007). UU No.28 Tahun 2007 tentang Kententuan Umum dan Tata Cara Perpajakan (KUP).Kementerian Keuangan RI. (2008). UU No.36 Tahun 2008 tentang Pajak Penghasilan.Kementerian Keuangan RI. (2009). UU No.6 Tahun 2009 Bab 2 tentang Nomor Pokok Wajib Pajak, Pengukuhan Pengusaha Kena Pajak, Surat Pemberitahuan, dan Tata Cara Pembayaran Pajak.Kementerian Koperasi dan Usaha Kecil dan Menengah Republik Indonesia. (n.d.). Retrieved March 2019, from depkop.go.idMardiasmo. (2016). Perpajakan Edisi Terbaru 2016. Yogyakarta: CV. ANDI OFFSET.Mustofa, F. A., Kertahadi, & Maulinarhadi, M. (2016). Pengaruh Pemahaman Peraturan Perpajakan, Tarif Pajak, dan Asas Keadilan Terhadap Kepatuhan Wajib Pajak (Studi pada Wajib Pajak Usaha Mikro Kecil dan Menengah di Wilayah Kerja KPP Pratama Batu Setelah Berlakunya PP No.46 Tahun 2013). Jurnal Perpajakan, 8 (1).Rahardjo, M. (2017). Studi Kasus dalam Penelitian Kualitatif: Konsep dan Prosedurnya. Malang: Universitas Islam Negeri, Indonesia.Rahayu, S. K., & Suhayati, E. (2013). Perpajakan Indonesia: Teori dan Teknis Perhitungan. Yogyakarta: Graha Ilmu.Resmi, S. (2017). Perpajakan Teori dan Kasus Edisi 10 Buku 1. Yogyakarta: Salemba Empat.Robbins, S. P., & Judge, T. A. (2013). Organizational Behavior Fifteenth Edition. United States: Pearson Education, Inc.Saldana, J. (2009). The Coding Manual For Qualitative Researchers. London: SAGE Publications Ltd.Sari, R. (2018). Kebijakan Insentif Pajak Bagi Usaha Mikro, Kecil, dan Menengah. Bidang Ekonomi dan Kebijakan Publik, 10 (12), 19-24.Suandy, E. (2011). Hukum Pajak Edisi 5. Jakarta: Salemba Empat.Sudirman, R., & Amiruddin, A. (2015). Perpajakan: Pendekatan Teori dan Praktek. Malang: Empat Dua Media.Supriyanto, E. (2011). Akuntansi Perpajakan. Yogyakarta: Graha Ilmu.Tambunan, T. (2012). Usaha Mikro Kecil dan Menengah di Indonesia, Isu-Isu Penting. Jakarta: LP3ES.Tatik. (2018). Potensi Kepatuhan Pembayaran Pajak Pada Pelaku UMKM (Usaha Mikro Kecil dan Menengah) Pasca Penerbitan Peraturan Pemerintah Nomor 23 Tahun 2018 (Studi Kasus Pada UMKM di Kabupaten Sleman-Yogyakarta). Seminar Nasional dan Call for Paper Sustainable Competitive Advantage (SCA) 8, 1-7.Tax Citizen Journalism. (2015). Forum Pajak Indonesia. Retrieved March 2019, from https://forumpajak.org/faqs/norma-penghitungan-penghasilan-neto/Waluyo. (2017). Perpajakan Indonesia Edisi 12. Jakarta: Salemba Empat.
La croissance des chiffres d'affaires issus de la vente en ligne de produits physiques témoigne de l'intérêt des fournisseurs pour l'adoption du e-commerce B2C comme un canal de distribution alternatif à la vente au détail classique. Les retombées positives du B2C sont prônées tant bien au niveau de la littérature scientifique qu'au niveau de la pratique. En effet, l'utilisation des magasins virtuels ayant substitué l'exploitation des magasins conventionnels permet aux e-fournisseurs d'atteindre un large éventail géographique d'une clientèle accessible par Internet. Du côté des consommateurs, l'accessibilité aux produits à tout moment et la livraison à domicile améliorent leur expérience de magasinage, notamment des économies en temps et de carburant. Cette vision commune des retombées de la distribution B2C ne considère que «la face apparente de l'iceberg», confinée à la prise de commande et au dernier kilomètre de livraison. Dans cette thèse, nous nous intéressons à investiguer les impacts de la distribution e-commerce sur une étendue plus large qui englobe le système complet de distribution du e-fournisseur. En effet la complexité de son contexte opérationnel multi-acteur met en épreuve sa capacité à gérer ses opérations de distribution de manière durable, tout en assurant des délais de livraison de plus en plus courts à ses e-consommateurs. D'autant plus, les systèmes de distribution B2C héritent des symptômes d'inefficience observés dans l'environnement logistique actuel. Par ailleurs, le concept de distribution hyperconnectée habilitée par l'Internet Physique (PI ou π) présente une alternative candidate qui à priori permettrait aux e-fournisseurs d'améliorer leurs performances par rapport aux approches actuelles de la gestion de la distribution B2C. Cette thèse développe une étude exploratoire des impacts de l'utilisation de la distribution hyperconnectée habilitée par π sur le potentiel durable de e-fournisseurs, en comparaison avec les options de distribution B2C actuelles. Pour ce faire, des études de cas à base de simulations multiagents ont été développées pour la modélisation de scénarios de distribution d'un e-fournisseur, inspirés des données réelles de notre partenaire industriel Industries de la Rive Sud. L'utilisation d'indicateurs clés de performance nous a permis d'évaluer progressivement les performances du e-fournisseur dans des scénarios portant d'abord sur l'approche de distribution drop-ship. Ensuite nous avons évalué une approche dynamique de déploiement distribué de B2C dans le contexte logistique actuel puis dans un contexte habilité par π. Cette thèse contribue en premier lieu à combler la faille théorique qui existe entre la recherche et la pratique en termes de modélisation des systèmes de distribution B2C intégrée. La deuxième contribution est le développement d'un modèle conceptuel multi-agent générique pour la simulation de scénarios de distribution B2C. La troisième contribution est la proposition d'une approche de consolidation intégrée qui permet aux e-fournisseurs d'améliorer leurs performances tout en réduisant de manière globale les délais de livraison des commandes des e-consommateurs dans le cadre d'une approche de distribution drop-ship. La quatrième contribution est la proposition d'un modèle dynamique d'équilibrage des inventaires dans le réseau de distribution d'un e-fournisseur. La dernière contribution confirme par expériences de simulation qu'une distribution hyperconnectée habilitée par PI permet de renforcer le potentiel durable des e-fournisseurs. ; The growth of online sales of physical products demonstrates the interest of suppliers for the adoption of B2C e-commerce as an alternative distribution channel to the conventional retail channel. The benefits of B2C are promoted not only by the scientific literature but also by practically grounded professional literature. In fact, Web stores complemented conventional Brick-and-Mortar retail shops, allowing e-vendors to access a wide geographical range of e-consumers through the Internet. On the consumer side, accessing products at any time and home delivery enhance their shopping experience, notably through time and fuel savings. This common vision of B2C distribution benefits considers only «the visible face of the iceberg», confined to the ordering process and the last-mile delivery. In this thesis, we are interested in investigating the impacts of e-commerce distribution over a larger scope that encompasses the entire distribution system of e-vendors. In fact, the complexity of their multi-actor operational environment challenges their ability to manage their distribution operations in a sustainable way, while ensuring ever quicker deliveries to their e-consumers. Moreover, B2C distribution systems inherit the inefficiency symptoms observed through the current logistics environment. Besides, the concept of the Physical Internet (PI or π) enabled hyperconnected distribution is a priori a candidate alternative that allows e-vendors to improve their performance, in contrast with current B2C distribution approaches. Through an exploratory study, this thesis investigates the impacts of a PI-enabled hyperconnected distribution on the sustainable potential of e-vendors, in contrast with current B2C distribution options. To this end, case studies based on multi-agent simulations were developed for modeling e-vendor distribution scenarios, inspired by actual data from our industrial partner South Shore Industries. Through the use of key performance indicators (KPIs), we gradually assessed e-vendor performance starting from the drop-ship distribution approach. Then, we assessed a dynamic B2C deployment approach in the current logistics environment then in a PI-enabled context. The first contribution of this thesis is to close the theoretical gap between research and practice in terms of modeling integrated B2C distribution systems. The second contribution is the development of a generic multi-agent conceptual model for B2C distribution scenario simulations. The third contribution is the proposal of an integrated consolidation based distribution approach allowing e-vendors to improve their performances, while globally reducing e-consumer order delivery times, within a drop-ship distribution based approach. The fourth contribution is the proposal of an e-vendor dynamic inventory balancing model. The last contribution confirms through a simulation-based experiment, that a PI-enabled hyperconnected distribution leverages the sustainable potential of e-vendors.