Topic
Service provider
About: Service provider is a research topic. Over the lifetime, 55107 publications have been published within this topic receiving 894381 citations. The topic is also known as: external service provider & internal service provider.
Papers published on a yearly basis
Papers
More filters
••
TL;DR: In this paper, the authors identify four key elements of user involvement in new service development, including objectives, stages, intensity, and modes of involvement, and then investigate these four elements in 12 service firms.
Abstract: Due to major structural changes in the service sector, many service managers are recognizing the need to continually develop new services that are timely and responsive to user needs. Thus, user input and involvement in new service development are an important area of inquiry. Although there has been a resurgence of academic and practitioner interest in new service development, there is a dearth of research on how users are involved in new service development. This study first combines insights from extant literature and exploratory interviews with practitioners to identify four key elements of user involvement, including objectives, stages, intensity, and modes of involvement, and then investigates these four elements in 12 service firms. Based on the findings, the author develops an inventory of activities that needs to be carried out in involving users in a new service development project.
639 citations
••
25 Feb 2014
TL;DR: This chapter discusses goal setting, follow-up, and goal monitoring in the context ofGoal Attainment Scaling, with a focus on the second half of the 1990s.
Abstract: There is an extensive literature on Goal Attainment Scaling (GAS), but the publications are widely scattered and often inaccessible, covering several foreign countries and many professional disciplines and fields of application. This book provides both a user manual and a complete reference work on GAS, including a comprehensive account of what the method is, what its strengths and limitations are, how it can be used, and what it can offer. The book is designed to be of interest to service providers, program directors and administrators, service and business organizations, program evaluators, researchers, and students in a variety of fields. No previous account of GAS has provided an up-to-date, comprehensive description and explanation of the technique. The chapters include a basic "how to do it" handbook, step-by-step implementation instructions, frequently occurring problems and what should be done about them, methods for monitoring the quality of the goal setting process, and a discussion of policy and administration issues. There are many illustrations from actual applications including examples of goals scaled for the individual, the specific program, the agency, or the total system. Procedures for training and estimates of training costs are also provided.
637 citations
••
TL;DR: In this article, a typology of service maneuvers achieved by manufacturing companies is developed based on two dimensions: service specificity (split into customer service, product services and service as a product) and organizational intensity (tactical, strategic or cultural).
Abstract: This paper develops a typology of service maneuvers achieved by manufacturing companies. This typology is based on two dimensions: service specificity (split into customer service, product services and service as a product) and organizational intensity (tactical, strategic or cultural).The paper reviews the benefits and costs associated with service maneuvers and discusses their interplay with the typology. A collaborative option is proposed as an original strategy for supporting the challenging process of implementing a service maneuver, and the costs of running this option are developed in the light of the typology.
636 citations
••
IBM1
TL;DR: The design and implementation of an anonymous credential system based on the protocols developed by [6] is described, based on new high-level primitives and interfaces allowing for easy integration into access control systems.
Abstract: Anonymous credential systems [8, 9, 12, 24] allow anonymous yet authenticated and accountable transactions between users and service providers. As such, they represent a powerful technique for protecting users' privacy when conducting Internet transactions. In this paper, we describe the design and implementation of an anonymous credential system based on the protocols developed by [6]. The system is based on new high-level primitives and interfaces allowing for easy integration into access control systems. The prototype was realized in Java. We demonstrate its use and some deployment issues with the description of an operational demonstration scenario.
634 citations
••
TL;DR: It is argued that blockchain (BC), a disruptive technology that has found many applications from cryptocurrencies to smart contracts, is a potential solution to these challenges and is proposed a BC-based architecture to protect the privacy of users and to increase the security of the vehicular ecosystem.
Abstract: Interconnected smart vehicles offer a range of sophisticated services that benefit the vehicle owners, transport authorities, car manufacturers, and other service providers. This potentially exposes smart vehicles to a range of security and privacy threats such as location tracking or remote hijacking of the vehicle. In this article, we argue that blockchain (BC), a disruptive technology that has found many applications from cryptocurrencies to smart contracts, is a potential solution to these challenges. We propose a BC-based architecture to protect the privacy of users and to increase the security of the vehicular ecosystem. Wireless remote software updates and other emerging services such as dynamic vehicle insurance fees are used to illustrate the efficacy of the proposed security architecture. We also qualitatively argue the resilience of the architecture against common security attacks.
627 citations