Classifying Personalization Constraints in Digital Business Environments through Case Study Research
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2013, Vol 4, Issue 1
Abstract
To aid professionals in the early assessment of possible risks related to personalization activities in marketing as well as to give academics a starting point to discover not only the opportunities but also the risks of personalization, a ‘Classification Scheme of Personalization Constraints’ is established after the analysis of 24 case studies. The classification scheme includes three dimensions: origin (internal, external), subject (technological, organizational) and time (data collection, matchmaking, delivery) and describes the different obstacles with which companies are confronted when implementing personalization activities. Additionally four ‘Standard Types of Personalization Environments’ are developed. They describe a set of business environments which inherit different internal and external risks related to personalization activities in marketing. The standard types are termed Flow, Performance, Dependence and Risk.
Authors and Affiliations
Michael J. Harnisch
Algorithm design for a supply chain equilibrium management model
In this paper, we consider a complementary model for the equilibrium management of supply chain. In order to give an optimal decision for the equilibrium management, we propose a new algorithm based on an estimate...
Evaluation of Spectral Efficiency, System Capacity And Interference Effects on CDMA Communication System
Wireless communication technology have been developed based on exploring new mobile communications frequency bands, reasonable use of frequency resources and minimization, portability and multifunction’s of mobile statio...
Defense against SYN Flood Attack using LPTR-PSO: A Three Phased Scheduling Approach
Security has become a critical factor in today’s computation systems. The security threats that risk our confidential information can come in form of seemingly legitimate client request to server. While illegitimate requ...
Motif Detection in Cellular Tumor p53 Antigen Protein Sequences by using Bioinformatics Big Data Analytical Techniques
Due to the rapid growth of data in the field of big data and bioinformatics, the analysis and management of the data is a very difficult task for the scientist and the researchers. Data exists in many formats like in the...
Fast–ICA for Mechanical Fault Detection and Identification in Electromechanical Systems for Wind Turbine Applications
Recently, the approaches based on source separation are increasingly adopted for the fault diagnosis in several industrial applications. In particular, Independent Component Analysis (ICA) method is attractive, thanks to...