• Title/Summary/Keyword: Key Performance

Search Result 5,761, Processing Time 0.027 seconds

Theorizing Length of Relationship as Moderator of Key Account Management Performance- Repeat Order Link

  • Ahmmed, Kawsar;Mohd, Nor Azila
    • The Journal of Economics, Marketing and Management
    • /
    • v.2 no.1
    • /
    • pp.1-17
    • /
    • 2014
  • In today's highly competitive and fast changing business environment, key account management-a supplier company initiated relationship marketing approach targeted at the most important customers to solve their complex requirements with special treatment that eventually ensures both parties' financial and nonfinancial objectives- has regarded as a strategic weapon of many companies' sales efforts to manage their strategically important customers. On the basis of the existing studies, this research introduces a theoretical model highlighting the hypothetical relationship between key account management performance and repeat order. In addition, moderating effect of length of relationship on the relationship between key account management performance and repeat order is also introduced. We theorize the conditions under which key account management performance influences key customer repeat order behavior as well as the influence of moderating variable of length of relationship on key account management performance-repeat order relationship. Theoretical and managerial implications are provided along with suggestions to isolate a platform for future empirical research.

Secure and Efficient Tree-based Group Diffie-Hellman Protocol

  • Hong, Sung-Hyuck
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.3 no.2
    • /
    • pp.178-194
    • /
    • 2009
  • Current group key agreement protocols(often tree-based) involve unnecessary delays because members with low-performance computer systems can join group key computation. These delays are caused by the computations needed to balance a key tree after membership changes. An alternate approach to group key generation that reduces delays is the dynamic prioritizing mechanism of filtering low performance members in group key generation. This paper presents an efficient tree-based group key agreement protocol and the results of its performance evaluation. The proposed approach to filtering of low performance members in group key generation is scalable and it requires less computational overhead than conventional tree-based protocols.

Managing Key Accounts in the Readymade Garments Industry: To What Extent Bangladeshi Companies Perform

  • Ahmmed, Kawsar;Noor, Nor Azila Mohd.
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.5 no.4
    • /
    • pp.57-65
    • /
    • 2018
  • With the paramount importance of key account management in business-to-business relationship, today companies are using this approach as a strategic weapon in their selling efforts targeted at the most important customers to solve their complex requirements with special treatment that eventually ensures both parties' financial and nonfinancial objectives. The aim of this paper is to investigate the level of key account management performance among the export-oriented readymade garments companies in Bangladesh with regards to company's experience in business, size of the company and key account serving capacity of the company. Using a questionnaire, data from 112 readymade garments companies in Bangladesh were collected and analyzed using descriptive analysis and ANOVA to test the level of key account management performance. Results show that the level of key account management performance by the garments companies did not vary by the company's experience in business and size of the company respectively. In contrast, the level of key account management performance was found to be different concerning high, medium, and low customer service capacity. Apparently, companies with big number of customers show better performance than companies with small number of customer. Implications for this study are discussed along with suggestions for future research avenues.

Research Progress in SiC-Based Ceramic Matrix Composites

  • Dong, Shaoming;Wang, Zhen;Zhou, Haijun;Kan, Yan-Mei;Zhang, Xiangyu;Ding, Yusheng;Gao, Le;Wu, Bin;Hu, Jianbao
    • Journal of the Korean Ceramic Society
    • /
    • v.49 no.4
    • /
    • pp.295-300
    • /
    • 2012
  • SiC-based ceramic matrix composites show many advantages over their monolithic ceramic counterparts, which makes them potential candidates for applications in various fields. Depending strongly on the chemical composition and microstructure of the fiber reinforcement, matrix as well as the fiber/matrix interphase in the material, the properties of ceramic matrix composites(CMCs) are highly tailorable. In this paper, the latest progresses in the interphase design, matrix modification and fiber reinforcement decoration of CMCs are reviewed, their effects on the properties of the CMCs are introduced.

A Study on Mobile IPv4 Authentication Mechanisms

  • Lim, Jung-Muk;Lim, Hyung-Jin;Chung, Tai-Myoung
    • Proceedings of the Korea Society of Information Technology Applications Conference
    • /
    • 2005.11a
    • /
    • pp.277-280
    • /
    • 2005
  • With the proliferation of mobile terminals, use of the Internet in mobile environments is becoming more common. To support mobility in these terminals, Mobile IPv4 is proposed and represents the standard in IPv4 environments. Authentication should be mandatory, because mobile terminals can utilize Internet services in any foreign domain. Mobile IPv4 provides symmetric key based authentication using the default HMAC-MD5. However, symmetric key based authentication creates a key distribution problem. To solve this problem, public key based authentication mechanisms have been proposed. In this paper, the performance of each of these mechanisms is evaluated. The results present that, among these mechanisms, partial certificate based authentication has superior performance, and certificate based authentication has the worst performance. Although current public key based authentication mechanisms have lower performance than symmetric key based authentication, this paper presents the possibility that public key based authentication mechanisms may be used for future mobile terminal authentication.

  • PDF

Determinants of Key Account Management Performance in Business-to-Business Relationship: The Garments Industry in Bangladesh

  • Ahmmed, Kawsar;Noor, Nor Azila Mohd
    • Journal of Distribution Science
    • /
    • v.12 no.11
    • /
    • pp.5-13
    • /
    • 2014
  • Purpose - This study traces the determinants of key account management performance in the garments industry in Bangladesh. The key account management approach involves significant challenges for marketers to manage their strategically important customers and use this approach as a strategic weapon in their selling efforts. This study examines three categories of determinants of key account management performance including operational variables, organizational variables, and relational variables by exploring data from 100% export oriented readymade garments companies in Bangladesh. Research design, data, and methodology - Data were collected from 30 readymade garments manufacturers, considering a company as a unit of analysis. Using the data, instrument validity and reliability and, subsequently, data normality were examined using the Statistical Package for the Social Sciences (SPSS) software to isolate the important determinants of key account management performance. Results - The instruments are reliable and the data are reasonably normal. Conclusion - The study explored and validated the adapted instruments of various operational, organizational, and relational antecedent factors of key account management performance, most of which were thus far ignored.

Return on Leadership

  • Martensen, Anne;Gronholdt, Lars
    • International Journal of Quality Innovation
    • /
    • v.6 no.3
    • /
    • pp.19-37
    • /
    • 2005
  • It is generally accepted that leadership is the foundation for creation of a company's business results. However, empirical evidence is lacking. This paper examines the relationship between leadership and key performance results based on a Return on Leadership Model. The model links Denison's four leadership traits to people results, customer results, and ultimately key performance results. Further specified, the model is a structural equation model with nine latent variables, each measured by a set of indicators, observed by survey questions. To validate the model, an empirical study was conducted, and 379 managers from medium-sized and large companies in Denmark participated. The estimation of the model shows that the model structure explains return on leadership very well, and the findings support the developed model. We are able to quantify the relationships from leadership to people results, customer results and key performance results and, in this way, the data presented here provide evidence that leadership is linked to key performance results. Several results and applications of the model are shown. The findings provide new knowledge about how leadership can be linked to performance, and how excellent leadership creates key performance results.

Performance Analysis of Key Exchange Protocols on ETSI Standard (ETSI 표준 키 교환 프로토콜의 성능 분석)

  • Lee, Young-Seok;Choi, Hoon
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.8 no.6
    • /
    • pp.520-527
    • /
    • 2015
  • The key exchange protocols are very crucial tools to provide the secure communication in the broadband satellite access network. They should be required to satisfy various requirements such as security, key confirmation, and key freshness. In this paper, we present the security functions in ETSI(European Telecommunications Standards Institute), and analyze the specification of the security primitives and the key exchange protocols for the authenticated key agreement between RCST(Return Channel Satellite Terminal) and NCC(Network Control Centre). ETSI key exchange protocols consists of Main Key Exchange, Quick Key Exchange, and Explicit Key Exchange. We analyse the pros and cons of key exchange protocols based on performance analysis and performance evaluation.

A Study on the Key Performance Factors of Passenger Airbag and Injury Risk Prediction Technique Development (동승석 에어백 핵심 성능 인자 및 상해위험도 예측 기법 개발에 대한 연구)

  • Park, Dongkyou
    • Transactions of the Korean Society of Automotive Engineers
    • /
    • v.21 no.5
    • /
    • pp.130-135
    • /
    • 2013
  • Until now, passenger airbag design is based on the referred car design and many repetitive crash tests have been done to meet the crash performance. In this paper, it was suggested a new design process of passenger airbag. First, key performance factors were determined by analyzing the injury risk effectiveness of each performance factor. And it was made a relationship between injury risk and performance factor by using the response surface model. By using this one, it can be predicted the injury risk of head and neck. Predicted injury risk of optimal design was obtained through this injury risk prediction model and it was verified by FE analysis result within 18% error of head and 9% error of neck. It was shown that a target crash performance can be met by controlling the key performance factors only.