首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
构建以运营商为主导的中国电信行业战略联盟的思考   总被引:2,自引:0,他引:2  
简勤 《电信科学》2007,23(5):1-5
本文从论述战略联盟的基本理论入手,以战略联盟多发的中国电信行业为研究对象,分析了以运营商为主导的电信行业构建战略联盟的动因及发展趋势,并针对电信行业的战略联盟现状,提出电信企业间伙伴关系管理是构建战略联盟的关键,建议以竞合的思维选择联盟伙伴,从协同联盟之间的文化,增加联盟沟通,提高联盟之间的信任与忠诚以及合理分配战略联盟的利益几个方面着手管理联盟伙伴关系.本文对构建电信企业间的战略联盟所提出的可行性政策、建议,将对中国电信企业建立战略联盟的实践产生一定的指导作用,从而进一步优化我国电信产业链.  相似文献   

2.
A learning perspective was applied to examining when multinational corporations select universities rather than local firms as partners in international R&D alliances. Data were collected on 327 international R&D alliances established over the 1995--2001 period in China, an emerging economy where intellectual property rights protection is still far from adequate, over the 1995–2001 period. The effects of factors such as the international investor's host country R&D experience and the venture's research objectives on the selection of universities or research institutes as local partners for R&D alliances were analyzed. Analysis using logistic regression models suggests that the contribution of local universities and research institutes to such R&D collaborations is likely to be high when foreign investors have had abundant prior R&D experience in the host country and when the alliance has been established primarily for research rather than development purposes. The implications for theory, practice, and policymaking are discussed.   相似文献   

3.
4.
Corporations are changing; they are reinventing, rethinking, transforming, and reengineering themselves. And with change comes chaos, uncertainty, and renewal. For everyone involved, change represents either a threat to security or an opportunity to move forward. What are the forces at work in changing corporations? In the author's own research on corporate culture and on the forces affecting corporate communication, marketing, and advertising, five general categories of forces have emerged: a new sophistication in customers or audience; new media and technologies or communication tools; a more complex ethical environment; stronger economic factors; and new strategic alliances  相似文献   

5.
Retiring into neutraling is a commonplace career move. Mediation consumers seek out the former senior judges and partners, even though they complain about them. For the transitioning lawyers, there's training to take, and longtime skills–make that ingrained habits–that need to be updated. London's Sir Henry Brooke gives a simultaneously serious and fun view from abroad on how the move from the bench affects the judge, and future mediation processes  相似文献   

6.
P. B. Linhart  R. Radner 《电信纪事》1987,42(11-12):720-730
With the rapid expansion of markets for telecommunications services and equipment, both national and international, one sees an increasing frequency of alliances in which each of two firms seeks to use the other to complete its portfolio strengths. Often this combination enables firms to achieve the product differentiation that seems to be the key to competitive advantage in modern telecommunications markets. This alliance may take the form of a « joint venture », which in the paper includes as limiting cases a subsidiary wholly owned by one firm, a technology licensing arrangement, and direct exporting. The model of such a venture presented here, although simple, is rich enough to illustrate the influence of four types of factors on the negotiations that set up the venture: demand, costs, risk, and regulatory constraints. We characterize the sets of acceptable and efficient arrangements, under various assumptions about exogeneous factors. The partners must choose among these by some form of bargaining.  相似文献   

7.
Authentication schemes assure that authorised user can fraudulently obtain his/her required services from home domains. Recently, Li et al. (International Journal of Network Management, 2013; 23(5):311–324) proposed a remote user authentication scheme. They claimed that their protocol is secure against known security attacks. However, in this paper, we indicate that Li et al.'s scheme is insecure against user impersonation attack. We show that an active adversary can easily masquerade as a legitimate user without knowing the user's secret information. As a remedy, we also proposed an improved authentication scheme to overcome the security weaknesses of Li et al.'s scheme. To show the security of our scheme, we prove its security the random oracle model. The implementation results show that our improved scheme offers a reduction of 58% in computational cost and a communication cost reduction of 48% with respect to Li et al.'s scheme. Copyright © 2014 John Wiley & Sons, Ltd.  相似文献   

8.
This paper explores how firmspsila alliance portfolios are related to patent output in the biotechnology industry. We propose that patent output is related to the composition of the firm's alliance portfolio, including the diversity of technologies, depth and scope of technologies, extent of alliance partner cospecialization, entry stage of technology development, and extent of prior alliance partner experience. We draw from real-options-based and knowledge-based views to develop a typology of alliance portfolios, arguing that each portfolio type differs in its effects on intra- and interorganizational dynamics, and thus, on patent output. Our proposed typology suggests that biotechnology firms follow four types of alliance portfolio strategies: focus, hedge, enable, and combine. Using secondary data provided by the ReCap, Delphion, and Compustat databases on 827 biotechnology alliances among 353 firms from 1995 to 2003, we found support for our proposed typology. Empirical results showed that firms with focus and hedge alliance portfolios had greater patent output than firms with enable or combine portfolios, and firms with focus alliance portfolios had the greatest patent output. We conclude with a discussion of our key findings along with implications for theory, future research, and management practice.  相似文献   

9.
Editor's note: From June 27 to July 15, the U.N. Commission on International Trade Law, best known as UNCITRAL, held its 49th session at the United Nations. The International Institute for Conflict Prevention and Resolution, which publishes Alternatives, has been active in UNCITRAL's dispute resolution work over the past five years. The CPR Institute was invited to become an official NGO Observer to UNCITRAL Working Group III (Online Dispute Resolution) in Spring 2011. In Fall 2011, the author was invited to serve as a member of the U.S. Delegation to Working Group III, and she has served on the U.S. delegation to the UNCITRAL Commission beginning with the 45th Session in 2012. Below is an account of the key conflict resolution issues addressed earlier this summer.  相似文献   

10.
The deregulation of the telecommunications industry and its convergence with the broadcasting and computer industries have led to a variety of alliances within the redefined sector. The paper uses recent developments in the economics of a corporate structure to provide some tools for an analysis of these moves. It focuses on the firm’s choice of internal organization, boundaries and alliances. After a brief recap of mergers and alliances in the three industries, the paper reviews the three possible motivations for such moves : efficiency, acquisition of market power, and objectives of entrenched managers. It then uses a formal model to provide a definition for the usually loose concept of core competency and to determine a firm’s legal boundaries and sphere of influence as a function of its headquarters’ ability to oversee activities. Last, it derives some implications of the analysis for the organization of R&;D.  相似文献   

11.
An important application of the Internet is that people can find partners satisfying their requirements from the huge number of users. In this paper, we present a cryptographic protocol for private matching, in which a user finds her desired partners without revealing her requirements, and the potential partners do not need to reveal their profiles. An additional advantage of our protocol is that it is identity‐based, which means the involved parties do not need to have a priori knowledge of each other's public keys; as long as they know each other's identities, the protocol can be executed. Copyright © 2010 John Wiley & Sons, Ltd.  相似文献   

12.
Satellite's communication system is used to communicate under significant distance and circumstances where the other communication systems are not comfortable. Since all the data are exchanged over a public channel, so the security of the data is an essential component for the communicating parties. Both key exchange and authentication are two cryptographic tools to establish a secure communication between two parties. Currently, various kinds of authentication protocols are available to establish a secure network, but all of them depend on number–theoretical (discrete logarithm problem/factorization assumption) hard assumptions. Due to Shor's and Grover's computing algorithm number theoretic assumptions are breakable by quantum computers. Although Kumar and Garg have proposed a quantum attack-resistant protocol for satellite communication, it cannot resist stolen smart card attack. We have analyzed that how Kumar and Garg is vulnerable to the stolen smart card attack using differential power analysis attack described in He et al and Chen and Chen. We have also analyzed the modified version of signal leakage attack and sometimes called improved signal leakage attack on Kumar and Garg's protocol. We have tried to construct a secure and efficient authentication protocol for satellites communication that is secure against quantum computing. This is more efficient as it requires only three messages of exchange. This paper includes security proof and performance of the proposed authentication and key agreement protocol.  相似文献   

13.
This paper describes applications of adaptive predictive coding (APC) with maximum likelihood quantization (MLQ) which can cover a wide range of coding rates from 4.8 to 16 kb/s for low C/N satellite communication systems, such as maritime, aeronautical mobile and thin-route satellite communication systems, and also for speech and data integration, including digital circuit multiplication equipment (DCME) in business communication systems, such as INTELSAT business services (IBS). A 16 kb/s APC–MLQ hardware codec has been implemented by NEC–7720 DSP chips and the performance has been confirmed in subjective quality of speech through conversational tests. The objective performance has also been evaluated for non-voice signals, such as single and multi-frequency tones, and 1200 and 2400 b/s voiceband data signals. The APC-MLQ codec can transmit the voice-band data at 1200 b/s over two asynchronous tandem links and at 2400 b/s over one link. It was noted that the APC-MLQ codec is superior in speech performance at 16 kb/s to a narrow-band companded FM and meets requirements for low C/N satellite communication systems. For voice and data integration into 16 kb/s for 64 kb/s links, we propose a multi-media multiplexing for low C/N digital satellite communication systems and also a small-scale circuit multiplication system for business use. In these systems, a variable rate coding of APC-MLQ from 4.8 to 16 kb/s can be effectively introduced for voice and data integration.  相似文献   

14.
This study expands the relational turbulence model (RTM; Solomon & Knobloch,) by theorizing about how characteristics of relationships and relational judgments influence people's experiences of hurtful messages. Previous applications of RTM to hurt have uncovered associations among relational characteristics that influence people's hurtful experiences; however, the process by which these characteristics influence experiences of hurt remains unclear. We propose that relational communication (specifically, perceptions of dominance, and disaffiliation) is the mechanism linking relational qualities to hurt. A multigroup SEM was conducted to test for the possibility of sex differences. Results showed that people's experiences of hurt vary as a function of both relationship characteristics and relational inferences. Results also indicated a difference in path coefficients for males and females.  相似文献   

15.
Collective action and community ecology theories frame this study of longitudinal interorganizational networks in Croatia during the country's political transition. As time progresses toward political stability, grass-roots organizing activities shift through participation in new networks. Although engaged cross-sector communication was important in early stages of the transformation, homophilous partnering emerged as the system stabilized. System stability left room for organizations to exit the collective action network but with costs associated with centralized organizing. Over time, organizations embodied roles as ideological leaders, collective action network leaders, and within-sector network partners. We offer a unique contribution to community ecology and collective action theories with a communication-centered framework that emphasizes the nature of communication in interorganizational networks over a 4-year period.  相似文献   

16.
This article examines how the severity of a hurtful event and discrepancies in perceptions of relational communication affect perceived understanding and empathic accuracy (EA) in parent–adolescent discussions about a hurtful event in their relationship. Results from a dyadic interaction study showed that the severity of the hurtful event was negatively associated with perceived understanding. Furthermore, discrepancies in perceptions of disaffiliation behaviors during a conversation about a child's hurtful event were also negatively associated with perceived understanding. Discrepancy in perceptions of adolescent's dominance corresponded negatively with parents' perceived understanding when discussing the child's hurtful event. There were no significant associations with EA. The implications for work on hurtful events, understanding, and relational framing theory are discussed.  相似文献   

17.
The RFID reader collision problem, in which an RFID reader's interrogation is interfered by other concurrent readers' transmission, is considered an important issue to reliable operation and thus to the wide‐spread deployment of RFID networks. In this paper, we present modeling and analysis of the RFID reader collision problem. We observe asymmetry between an RFID reader's and a tag's communication capabilities and develop an RFID radio model based on the asymmetry. By the model, we characterize the spatial reuse of RFID reader networks, and derive concurrent interrogation distance beyond which readers can transmit simultaneously without causing collision and the carrier sense threshold corresponding to the distance. We also examine the dual‐channel mode where available bandwidth is divided into two channels by which reader‐to‐tag communication and tag‐to‐reader communication are separated. We analyze and evaluate the performance of the dual‐channel mode in terms of spatial reuse and interrogation completion time. Copyright © 2010 John Wiley & Sons, Ltd.  相似文献   

18.
This research examines the relationship between technology resources, alliance formation, and sustained growth in new technology-based firms. We employ a three-dimensional measure of technology resources that includes the development and commercialization of technologies, and represents both a firm's initial resource foundation and its early actions to build on this foundation. Our analysis of 67 computer and telecommunications firms reveals that innovative first products are not associated with sustained growth, while patenting and product development activities are. This indicates that new firms cannot rely on their initial innovations for longer term advantage, but need to undertake follow up actions to build their technology resource foundations. In addition, while all three of the technology resource variables are positively associated with alliance formation, alliances, in turn, are weakly and negatively associated with sustained growth. The advantage of forming alliances has long been extolled, and it was assumed these benefits extended to new firms and those in technology-intensive environments. These findings suggest, however, that building, rather than accessing, technology resources is more critical to long-term growth for these firms. Our research provides convincing evidence that new firms should not be complacent about their initial success derived from innovative beginnings. They must turn their attention, early on, to building their technology resources internally, while exercising caution with respect to alliances.  相似文献   

19.
This paper considers the channel assignment problem in a multi‐channel MANET environment. We propose a scheme called GRID, by which a mobile host can easily determine which channel to use based on its current location. In fact, following the GSM style, our GRID spends no communication cost to allocate channels to mobile hosts since channel assignment is purely determined by hosts' physical locations. We show that this can improve the channel reuse ratio. We then propose a multi‐channel MAC protocol, which integrates GRID. Our protocol is characterized by the following features: (i) it follows an ‘on‐demand’ style to access the medium and thus a mobile host will occupy a channel only when necessary, (ii) the number of channels required is independent of the network topology, and (iii) no form of clock synchronization is required. On the other hand, most existing protocols assign channels to a host statically even if it has no intention to transmit [IEEE/ACM Trans. Networks 1995; 3 (4):441–449; 1993; 1 (6): 668–677; IEEE J. Selected Areas Commun. 1999; 17 (8):1345–1352], require a number of channels which is a function of the maximum connectivity [IEEE/ACM Trans. Networks 1995; 3 (4):441–449; 1993; 1 (6): 668–677; Proceedings of IEEE MILCOM'97, November 1997; IEEE J. Selected Areas Commun. 1999; 17 (8):1345–1352], or necessitate a clock synchronization among all hosts in the MANET [IEEE J. Selected Areas Commun. 1999; 17 (8):1345–1352; Proceedings of IEEE INFOCOM'99, October 1999]. Through simulations, we demonstrate the advantages of our protocol. Copyright © 2005 John Wiley & Sons, Ltd.  相似文献   

20.
Relationships between types of innovative capabilities of firms, the amount and nature of technical alliance usage, and the extent and types of problems associated with those alliances are explored with firms in the semiconductor industry. Results show that, although firms need radical and/or incremental product and process innovation capabilities to compete successfully, they are likely to have core capabilities which are either product focused or process focused. Firms can reconcile radical and incremental R&D cultures, but find it more difficult to bridge the product-versus-process divide. Firms with strong capabilities are found to engage in more technical alliances. This is particularly true of firms with radical innovation capabilities. The study also finds that firms engage in technical alliances more often to supplement rather than complement their capabilities. Firms experience more problems in acquiring product innovation capabilities through alliances meant for new technology development than they do in acquiring process innovation capabilities  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号