Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Selected Works (125)
- SelectedWorks (37)
- The University of San Francisco (13)
- Singapore Management University (11)
- Universitas Indonesia (10)
-
- Kennesaw State University (9)
- California State University, San Bernardino (7)
- San Jose State University (6)
- Georgia State University (5)
- Santa Clara University (5)
- Old Dominion University (4)
- University of Dayton (4)
- University of Massachusetts Boston (4)
- University of Nebraska - Lincoln (4)
- Virginia Commonwealth University (4)
- Cleveland State University (3)
- Marshall University (3)
- National Taiwan Ocean University (3)
- Cedarville University (2)
- Georgia Southern University (2)
- New Jersey Institute of Technology (2)
- University of Arkansas, Fayetteville (2)
- University of Nevada, Las Vegas (2)
- Utah State University (2)
- Wright State University (2)
- Bentley University (1)
- Brigham Young University (1)
- City University of New York (CUNY) (1)
- Dakota State University (1)
- Edith Cowan University (1)
- Keyword
-
- Information Systems (8)
- Information systems (8)
- E-business and e-government (7)
- Proceedings (7)
- Strategy (7)
-
- Information security (6)
- Innovation (6)
- Service Systems (6)
- Service system (6)
- Work system theory (6)
- Architectural strategy (5)
- E-learning (5)
- Refereed Articles (5)
- Adoption (4)
- ICT (4)
- ICT for Development and Poverty Alleviation (4)
- Individual Computing Capabilities / End-User Training / IT Training (4)
- Local government (4)
- Management (4)
- Other System-Related Articles (4)
- Service science (4)
- Social Media (4)
- Technology (4)
- Theory and Meta-Theory (4)
- Work system (4)
- Africa (3)
- Collaboration (3)
- Cyber (3)
- Cyber Operations (3)
- Cyber operations (3)
- Publication
-
- Dr Deogratias Harorimana (15)
- Associate Professor Linda Dawson (13)
- The South East Asian Journal of Management (10)
- Research Collection School Of Computing and Information Systems (9)
- Saurabh Gupta (9)
-
- Business Analytics and Information Systems (8)
- C. Jason Woodard (8)
- Pratyush Bharati (8)
- Steven Alter (8)
- Jan Kallberg (7)
- The African Journal of Information Systems (7)
- Journal of International Technology and Information Management (6)
- Computer Information Systems Faculty Publications (5)
- Dr. Mutaz M. Al-Debei (5)
- Information Systems and Analytics (5)
- Journal of Entrepreneurship, Management and Innovation JEMI (5)
- Surendra Sarnikar (5)
- Dr Khin Win (4)
- Jacob Johnsen, MSc (4)
- MIS/OM/DS Faculty Publications (4)
- Theses and Dissertations (4)
- Business Faculty Publications (3)
- Chong W. Kim (3)
- College of Business: Dissertations, Theses, and Student Research (3)
- Faculty Publications, Information Systems & Technology (3)
- Francesca Cabiddu (3)
- Herbert J. Mattord (3)
- Humayun Zafar (3)
- Journal of Marine Science and Technology (3)
- Maurice Dawson (3)
- Publication Type
Articles 1 - 30 of 289
Full-Text Articles in Business
Continuance Of Mhealth Services At The Bottom Of The Pyramid: The Roles Of Service Quality And Trust, Shahriar Akter, Pradeep Ray, John D'Ambra
Continuance Of Mhealth Services At The Bottom Of The Pyramid: The Roles Of Service Quality And Trust, Shahriar Akter, Pradeep Ray, John D'Ambra
Shahriar Akter
Continued usage of information systems (or, IS continuance) has proven to be a critical success parameter for ICT implementation at the top of the global economic pyramid. However, there are few studies which have explored continued IS usage at the bottom of the economic pyramid (BOP) though it represents the majority of the world’s population. To fill this knowledge gap, this study develops an mHealth continuance model at the BOP framing the impact of two post adoption expectation beliefs (i.e., perceived service quality and perceived trust). This study extends ECM (expectation confirmation model) perspective synthesizing the extant literature on continued …
Ict For Poverty Alleviation In Pacific Island Nations: Study Of Icts4d In Fiji, Deogratias Harorimana, Opeti Rokotuinivono, Emali Sewale, Fane Salaiwai, Marica Naulu, Evangelin Roy
Ict For Poverty Alleviation In Pacific Island Nations: Study Of Icts4d In Fiji, Deogratias Harorimana, Opeti Rokotuinivono, Emali Sewale, Fane Salaiwai, Marica Naulu, Evangelin Roy
Dr Deogratias Harorimana
ICT for Poverty Alleviation in Pacific Island Nations: Study of ICTs4D in Fiji There has been a vague and little knowledge on the role or potential of Information and Communications Technologies (ICTs) in relation to addressing poverty in Fiji. This may be probably due to the newness of the technology in the South Pacific Region as a whole but also probably due to the fact that only 9.7% of the current Fiji 931,000 populations are internet users (ITC Figures 2011). This paper reports on finding how ICTs is contributing towards poverty alleviation in Fiji. On the basis of reviewed best …
The Interplay Of Facilitating Conditions And Organizational Settings In The Acceptance Of Teleconsultation Technology In Public Hospitals In Malaysia, Nurazean Maarop, Khin Tan Win
The Interplay Of Facilitating Conditions And Organizational Settings In The Acceptance Of Teleconsultation Technology In Public Hospitals In Malaysia, Nurazean Maarop, Khin Tan Win
Dr Khin Win
This research explores users’ intention to use teleconsultation technology. The study also explores the influence of facilitating conditions on the acceptance of the technology in the health care environment in Malaysia. Further, the study compares the level of user acceptance in two organizational settings: (1) between emergency and non-emergency environment, and (2) between referring and referral hospital. This research presumes on the basis of exploratory and descriptive study engaging a survey of healthcare providers who practice in public hospitals in Malaysia. The study reports a high level of acceptance and acceptable extent of facilitating conditions of teleconsultation technology. Thus, some …
Applying The Modified Delphi Method To Identify The Taiwanese Electronic Health Record Systems Evaluation Framework And Instrument, Yung-Yu Su, Khin Than Win, Tieh-Chi Chung
Applying The Modified Delphi Method To Identify The Taiwanese Electronic Health Record Systems Evaluation Framework And Instrument, Yung-Yu Su, Khin Than Win, Tieh-Chi Chung
Dr Khin Win
The aim of this research is to design an appropriate conceptual evaluation framework with a draft instrument for validating the structure of the Taiwanese EHR systems evaluation framework. According to the knowledge of “Triangulation research method” and both quantitative and qualitative approaches, the modified Delphi method was applied to refine the proposed instrument into practicable for real medical environment based on a quantitative approach. In addition, by calculating content validity index for items (I-CVI) and content validity index for scales (S-CVI), it also indicates the degree of consensus between and within questions in the proposed instrument. In short, an appropriate …
Implementing Patient Accessible Health Information Site For Diabetes Management, Khin Than Win
Implementing Patient Accessible Health Information Site For Diabetes Management, Khin Than Win
Dr Khin Win
The focus of health care has changed from health care provider paternalistic approach to consumer focused approach. The aim of this study is to implement an online health information site for patient education of Diabetes. To achieve this, design criteria for effective patient education were considered and diabetes patients information site was implemented which includes patient information access, diabetes challenge, administrator module and the scheduler module. Implementing patients access for their health information with providing patients tailored health information according to their needs to enhance patient education is important. This project contributes vastly in consumer health informatics as it develops …
A Knowledge-Based Risk Advisor Model For Chronic Complications Of Diabetes, Mohsen Sangi, Khin Than Win, John Fulcher
A Knowledge-Based Risk Advisor Model For Chronic Complications Of Diabetes, Mohsen Sangi, Khin Than Win, John Fulcher
Dr Khin Win
Diabetes as an unprecedented epidemic is spreading all around the world. While one in every seven healthcare dollars in USA is spent on diabetes, 60% of direct costs and almost 80-90% of indirect costs of that are related to diabetic complications. The ultimate aim of this study is to develop a rule-based model for advising the risk of chronic diabetic complications. An extensive literature review has been carried out to gather actual knowledge about diabetic complications and their related predisposing factors. NVivo8 is used to organize and categorize the acquired knowledge. A rule-based decision support model is constructed from the …
Towards A Typology Of Green Is Strategies: Insights From Case Study Research, Fabian Loeser
Towards A Typology Of Green Is Strategies: Insights From Case Study Research, Fabian Loeser
Fabian Loeser
Presentation held @ ICIS 2012, Orlando Track 9: Green IS and Sustainability Session: Green IS/IT Initiatives December 19, 10:30 am – 12:00 pm, Salon 10
Distributed Development And Product Line Decisions, Ram Bala, V. Krishnan, Wenge Zhu
Distributed Development And Product Line Decisions, Ram Bala, V. Krishnan, Wenge Zhu
Information Systems and Analytics
Distributed product development is becoming increasingly prevalent in a number of industries. We study how the global distribution of product development impacts the profit-maximizing product line that a firm offers. Specifically, we formulate a model to understand the linkage between cost arbitrage as a driver of distributed development and consequent market implications such as customer perceived quality loss to remotely developed products. Analysis of the model reveals that a firm should expand the product line for a development-intensive good only at intermediate values of cost advantage and quality loss. We modify the base model to include development capacity constraints as …
Creating A Repository For The Design And Delivery Of Web Services, John D. Delano, Atish P. Sinha, Hemant Jain
Creating A Repository For The Design And Delivery Of Web Services, John D. Delano, Atish P. Sinha, Hemant Jain
Business Administration Faculty Publications
Existing web service repositories are not well suited to handle the multi-layered representation of web services, nor are they able to support multiple development methodologies. We describe the design and development of a repository called Web Service Crawler that supports both a traditional development methodology for the initial design of services, and an agile approach for the design of composite applications. Web Service Crawler is developed based on a set of theory-based design characteristics, and includes novel facets to represent multi-layered web services, such as workflow, composition, and layer. The positive evaluation results indicate that Web Service Crawler can be …
Creating A Repository For The Design And Delivery Of Web Services, John D. Delano, Atish P. Sinha, Hemant Jain
Creating A Repository For The Design And Delivery Of Web Services, John D. Delano, Atish P. Sinha, Hemant Jain
Business Administration Faculty Presentations
Existing web service repositories are not well suited to handle the multi-layered representation of web services, nor are they able to support multiple development methodologies. We describe the design and development of a repository called Web Service Crawler that supports both a traditional development methodology for the initial design of services, and an agile approach for the design of composite applications. Web Service Crawler is developed based on a set of theory-based design characteristics, and includes novel facets to represent multi-layered web services, such as workflow, composition, and layer. The positive evaluation results indicate that Web Service Crawler can be …
Rfid-Enabled Warehouse Process Optimization In The Tpl Industry, S. Wamba, A. Chatfield
Rfid-Enabled Warehouse Process Optimization In The Tpl Industry, S. Wamba, A. Chatfield
Dr Akemi Chatfield
Using the value chain model and a longitudinal real-world case study of a third-party logistics (TPL) supply chain, this study provides support for the enabling role of RFID technology in effecting warehouse process optimization. Furthermore, the findings of our study reveal the RFID technology implementation costs as the key inhibitors factor of RFID widespread adoption and usage among suppliers.
E-Government Challenge In Disaster Evacuation Response: The Role Of Rfid Technology In Building Safe And Secure Local Communities, A. Chatfield, S. F. Wamba, T. Hirokazu
E-Government Challenge In Disaster Evacuation Response: The Role Of Rfid Technology In Building Safe And Secure Local Communities, A. Chatfield, S. F. Wamba, T. Hirokazu
Dr Akemi Chatfield
While geographic information systems (GIS) can provide information on the static locations of critical infrastructure and evacuation routes, they do not provide the dynamically changing locations of things and people on the move. In contrast, radio frequency identification (RFID) wireless network technology can automatically identify and track the movement of assets (i.e., fire engines, ambulances, and rescue workers) and vulnerable citizens on the move (i.e., the elderly and the disabled), and hence providing local governments and communities with real-time information and enhanced decision-making capabilities, during chaotic disaster response operations (i.e., evacuation). Although the potential high impact and strategic value of …
Use Centric Hci Requirements Elicitation, Robert Brown
Use Centric Hci Requirements Elicitation, Robert Brown
Dr Robert Brown
Among persistent issues in HCI are its separation from the other disciplines involved in the construction of Information Systems, any coherently extensive methodology and straight forward techniques for clustering interface elements for best effect. An approach to HCI which encompasses the full context of use (rather than just of usage) and entails more traditional SA&D within a single framework could be of some value. This paper introduces the HCI values of the Activity Theoretic System Architecture (ATSA) Method.
Supporting Developers In Complex Systems Modelling, Antonio A. Lopez-Lorca, Ghassan Beydoun, Rodrigo Martínez-Béjar, Holly Tootell
Supporting Developers In Complex Systems Modelling, Antonio A. Lopez-Lorca, Ghassan Beydoun, Rodrigo Martínez-Béjar, Holly Tootell
Associate Professor Ghassan Beydoun
Development of complex systems often requires building a large number of models with many interconnections and dependencies among them. The success of a project can be compromised by cognitive overload or limits of developers, who might miss relationships between elements of the models. Developing Multi-Agent Systems (MAS) is a typical example of where this may occur. Despite of its potential, this technology has not yet been widely adopted by industry due to its complexity and frequent errors in modelling activities. These errors typically propagate to later phases of the MAS development lifecycle, becoming costlier to fix and then lowering the …
Metamodelling Approach To Support Disaster Management Knowledge Sharing, Siti Hajar Othman, Ghassan Beydoun
Metamodelling Approach To Support Disaster Management Knowledge Sharing, Siti Hajar Othman, Ghassan Beydoun
Associate Professor Ghassan Beydoun
Handling uncertain events that could happen anytime and anywhere and dealing with many complex systems interconnected physically and socially makes Disaster Management (DM) a multidisciplinary endeavor and a very difficult domain to model. In this paper we present a development and validation of a Disaster Management Metamodel (DMM), a language that we develop specific for describing DM domain. The metamodel, a precise definition of the constructs and rules needed for creating the semantic models of DM domain consists of four views based on four DM phases including Mitigation, Preparedness, Response and Recovery-phase classes of concept. A Model Importance Factor (MIF) …
Mechanisms That Impact Online Auction Trust, Glenn Robert Bewsell
Mechanisms That Impact Online Auction Trust, Glenn Robert Bewsell
Dr Glenn Bewsell
This research investigates mechanisms that impact trust and trust as an organising principle at online auctions using data collected from a community website. Qualitative analysis is used to make sense of the data collected and to identify key factors that impact trust and organising for trust. As a result of the discussion, I attempt to explore key factors that impact trust at online auctions and relate the discussion to previous research. This research adds to the understanding of trust theory and online auction trust, and this research can be used by practitioners to better support users and improve the design …
Electronic Documentation In Residential Aged Care Facilities – A Review Of The Literature On Organisational Issues And Early Findings On Initial Conditions From A Case Study, Kieren Diment, Ping Yu, Karin Garrety
Electronic Documentation In Residential Aged Care Facilities – A Review Of The Literature On Organisational Issues And Early Findings On Initial Conditions From A Case Study, Kieren Diment, Ping Yu, Karin Garrety
Dr Ping Yu
This paper discusses the theoretical rationale for an empirical study of organisational change arising from introduction of electronic nursing documentation in residential aged care facilities. The study draws on a processual view of organisational change, which is related to the theory of complex adaptive systems. First we review existing literature on electronic nursing documentation with an organisational focus to provide a context to help outline the research aims of the present study. Then we describe a method to explore the hierarchical nature of the work environment based on the sociological theory of Institutional Ethnography. Finally we use this approach to …
Diseñando Colisiones De Satélites En La Guerra Cibernética Encubierta, Jan Kallberg
Diseñando Colisiones De Satélites En La Guerra Cibernética Encubierta, Jan Kallberg
Jan Kallberg
La guerra concentrada en la red depende de la red de información global para capacidades de combate conjuntas.3 La capa fundamental crea la capacidad de combate global como la columna vertebral espacial de la red de información donde los haberes espaciales son el elemento decisivo. EE.UU. depende de las capacidades espaciales para su éxito y la seguridad nacional de EE.UU. se basa hoy en día en un número limitado de satélites muy utilizados. Estos satélites son cruciales para la disuasión estratégica, la vigilancia, la recopilación de inteligencia y las comunicaciones militares. Si la disuasión estratégica falla, los satélites forman parte …
Supporting Developers In Complex Systems Modelling, Antonio A. Lopez-Lorca, Ghassan Beydoun, Rodrigo Martínez-Béjar, Holly Tootell
Supporting Developers In Complex Systems Modelling, Antonio A. Lopez-Lorca, Ghassan Beydoun, Rodrigo Martínez-Béjar, Holly Tootell
Dr Holly Tootell
Development of complex systems often requires building a large number of models with many interconnections and dependencies among them. The success of a project can be compromised by cognitive overload or limits of developers, who might miss relationships between elements of the models. Developing Multi-Agent Systems (MAS) is a typical example of where this may occur. Despite of its potential, this technology has not yet been widely adopted by industry due to its complexity and frequent errors in modelling activities. These errors typically propagate to later phases of the MAS development lifecycle, becoming costlier to fix and then lowering the …
Information Security Awareness In Saudi Arabia, Abdulaziz Alarifi, H. Tootell, Peter Hyland
Information Security Awareness In Saudi Arabia, Abdulaziz Alarifi, H. Tootell, Peter Hyland
Dr Holly Tootell
While the Web, cell phone „apps‟ and cloud computing put a world of information at our fingertips, that information is under constant threat from cyber vandals and hackers. Although awareness of information threats is growing in the Western world, in places like Saudi Arabia, information security is very poor. Unlike Western pluralistic democracies, Saudi Arabia is a highly-censored country, with a patriarchical and tribal culture, which may influence its poor information security rating. This paper examines the level of information security awareness (ISA) among the general public in Saudi Arabia, using an anonymous online survey, based on instruments produced by …
A Critique Of The Marker Variable Technique: The Effect Of Alternative Marker Variable Criteria, Rajeev Sharma, Philip Yetton, Jeff Crawford
A Critique Of The Marker Variable Technique: The Effect Of Alternative Marker Variable Criteria, Rajeev Sharma, Philip Yetton, Jeff Crawford
Associate Professor Rajeev Sharma
The marker variable technique offers a practical and easy method to address the validity threat on account of common method variance to the findings of individual studies. However, the validity of the marker variable technique has not been established. This paper examines the validity threat to the marker variable technique arising from multiple criteria for the selection of the marker variable proposed in the literature. Our findings show that the conclusions that can be drawn under different criteria are significantly and substantially different, raising doubts about the validity of the marker variable technique. Proposals for developing theoretically grounded criteria for …
Organisational Culture And Organisational Impacts Of Information Systems: A Review Of The Empirical Literature, Fei Pang, Rajeev Sharma, Reeva Lederman, Suelette Dreyfus
Organisational Culture And Organisational Impacts Of Information Systems: A Review Of The Empirical Literature, Fei Pang, Rajeev Sharma, Reeva Lederman, Suelette Dreyfus
Associate Professor Rajeev Sharma
Organisational culture is an important influence in shaping the organisational impacts of Information Systems. However, the conceptualisation and operationalisation of culture in empirical studies does not reflect the richness of the theoretical literature. In particular, our review finds that the dynamic, emergent and reciprocal nature of the IS-culture relationship has not been adequately examined in the empirical literature. This is partly due to the methodologies employed in existing research. Suggestions for enriching empirical research into the IS- culture relationship are discussed.
Creating Value From Business Analytics Systems: A Process-Oriented Theoretical Framework And Case Study, Graeme Shanks, Nargiza Bekmamedov, Rajeev Sharma
Creating Value From Business Analytics Systems: A Process-Oriented Theoretical Framework And Case Study, Graeme Shanks, Nargiza Bekmamedov, Rajeev Sharma
Professor Rajeev Sharma
Business analytics can potentially create value and improve competitive advantage for firms. We argue that dynamic and operational capabilities, enabled by business analytics technology, lead to improved firm performance. We develop a process-oriented theoretical framework that explains how dynamic and operational capabilities interact over time to create value. We use the framework to explain how business value was achieved from business analytics systems in a case study at a financial institution. A number of implications of the study are discussed and suggestions for future work are provided.
The Impact Of Strategy And Maturity On Business Analytics And Firm Performance: A Review And Research Agenda, Graeme Shanks, Rajeev Sharma, Peter Seddon, Peter Reynolds
The Impact Of Strategy And Maturity On Business Analytics And Firm Performance: A Review And Research Agenda, Graeme Shanks, Rajeev Sharma, Peter Seddon, Peter Reynolds
Professor Rajeev Sharma
Business analytics involves interpreting organizational data to improve decision-making and to optimise business processes. It has the potential to improve firm performance and increase competitive advantage. Although many case studies have been reported that describe business analytics applications and speculate about how they might contribute to firm performance, there is no clearly articulated and theoretically grounded model in the literature. This paper proposes a theoretical framework for understanding how and why business analytics technology and capabilities can lead to value-creating actions that lead to improved form performance and competitive advantage. We focus particularly on how strategy and maturity impact business …
The Role Of Confirmation In Is Continuance Theory: A Comprehensive Meta-Analysis, John Laugesen
The Role Of Confirmation In Is Continuance Theory: A Comprehensive Meta-Analysis, John Laugesen
Publications and Scholarship
This paper provides a meta-analysis of Information Systems Continuance (ISC) theory, specifically focusing on the relationships that Confirmation has with Satisfaction, Perceived Usefulness and Continuance Intention. A comprehensive literature review for the years 2001 to 2012 revealed 75 ISC studies from 72 papers. The results of this meta-analysis indicate the robustness of ISC theory and model, with large effect sizes for the three key relationships. Moderator analyses indicate larger effect sizes for nonconvenience samples (versus convenience samples) and educational/eLearning Information Systems and personal Information Systems (versus corporate Information Systems). Implications of the results are discussed, along with implications for researchers …
Amazon.Com: Offering Everything From A To Z, Stephanie Lang, Logan Tinder, Jarett Zimmerman, Jeffrey S. Harrison
Amazon.Com: Offering Everything From A To Z, Stephanie Lang, Logan Tinder, Jarett Zimmerman, Jeffrey S. Harrison
Robins Case Network
Amazon’s focus on customer service has led to an impressive record of growth and profitability. However, late in 2012, the company posted a quarterly loss. This asks whether the company may be sacrificing profits in the interest of growing rapidly. It also explores the incredibly competitive environment Amazon faces.
Synergy And Its Limits In Managing Information Technology Professionals, Thomas W. Ferratt, Jayesh Prasad, Harvey Enns
Synergy And Its Limits In Managing Information Technology Professionals, Thomas W. Ferratt, Jayesh Prasad, Harvey Enns
MIS/OM/DS Faculty Publications
We examine the effects of human resource management (HRM) practices (e.g., career development, social support, compensation, and security) on IT professionals‟ job search behavior. Job search is a relatively novel dependent variable in studies of voluntary withdrawal behavior, in general, and for IT professionals, in particular. From a universalistic perspective, HRM practices individually and in combination exhibit independently additive effects on job search behavior. Our study contrasts this perspective with configurational theory, hypothesizing that proposed idealtype configurations of HRM practices have synergistic effects on job search behavior. We contribute to the IT and broader HRM literature by theoretically explicating and …
Portfolio Management: The Australian Experience, Aileen Koh, Lynn Crawford
Portfolio Management: The Australian Experience, Aileen Koh, Lynn Crawford
Aileen Koh
The increasing use of projects and programs by organizations to achieve business strategy and goals has led to the need for understanding project portfolio management. Along with the increasing diffusion of portfolio management, a new managerial role has evolved: the portfolio manager. This new role is pivotal in planning and controlling complex project landscapes more effectively and efficiently. This study investigates the governance structures and the roles, responsibilities, and practices of portfolio managers. A sequential mixed-method approach under a realism paradigm is used. This article presents the first-stage qualitative study, using an inductive interview-based approach with six portfolio managers from …
The Return Of Dr. Strangelove: How Austerity Makes Us Stop Worrying And Love The Bomb…And Cyber War, Jan Kallberg, Adam Lowther
The Return Of Dr. Strangelove: How Austerity Makes Us Stop Worrying And Love The Bomb…And Cyber War, Jan Kallberg, Adam Lowther
Jan Kallberg
With sequestration looming—generating significant cuts to defense spending—the United States may find itself increasingly relying on nuclear and cyber deterrence as an affordable way to guarantee national sovereignty and prevent major conflict. While earlier defense planning and acquisitions were based on economic conditions that no longer exist, Congress’ options to balance the budget by cutting defense spending are politically palatable because far fewer American are “defense voters” than “social welfare voters,” according to a number of recent public opinion surveys.
Innovation Dans La Livraison, Jacob Johnsen
Innovation Dans La Livraison, Jacob Johnsen
Jacob Johnsen, MSc
A summary of the status of postal volumes, the current decline in volumes and the compelling strategies to position posts for the future based on their delivering ability.