Fiber to the Premises

Author(s):  
Mahesh S. Raisinghani ◽  
Hassan Ghanem

Subscribers had never thought of cable operators as providers of voice services, or telephone companies as providers of television and entertainment services. However, the strategies of multiple system operators (MSOs) and telecommunication companies (telcos) are changing, and they are expanding their services into each other’s territory. The competition between the MSOs and the telcos is just brewing up.

2020 ◽  
Vol 6 (1) ◽  
pp. 307-321
Author(s):  
Ghaleb Rabab’ah ◽  
Lydia Idir ◽  
Sharif Alghazo

AbstractThe present study seeks to explore the link between persuasion and advertising by examining the persuasive appeals used by telecommunication companies in Jordanian and Algerian television commercials. To this end, 12 television advertisements (six from Jordan and six from Algeria) were randomly selected from YouTube. The data were analysed based on previous categorisations of persuasive appeals. The findings revealed that both groups of advertisements adopted various appeals to persuade their target audience to purchase products and experience their services, and that the most widely used appeals were play on words, brand, celebrity and music appeals. These findings provide insights into the value of understanding how persuasion is used in media discourse and in different linguistic and cultural milieus.


Author(s):  
Mohammad Fateh Ali Khan Panni ◽  
Naimul Hoque

Customer Knowledge Management (CKM) has become buzzword in modern knowledge driven society. As an innovative concept the study has attempted to find out the level of orientation of CKM practices in telecommunication sector in a developing country like Bangladesh through data and methodology triangulation approach. In the first phase of the study, quantitative technique has been used where data has been collected from 42 employees from major telecommunication companies such as Grameen Phone (GP), Banglalink, Robi, Airtel and Teletalk. In order to find out the details explanation of the quantitative results, an extensive open-ended survey has been conducted on experienced mid-level employees. In the last phase of the study, a Focus Group Discussion (FGD) was conducted on selected knowledgeable educated customers to cross check the results derived from the corporate people in order to ensure the reliability of the study.


1991 ◽  
Vol 3 (1) ◽  
pp. 42-69 ◽  
Author(s):  
Jeffrey E. Cohen

Between 1876 and 1917, government philosophy toward telephone regulation began moving away from laissez-faire and toward some kind of involvement in economic affairs. However, while some early studies of regulation suggest business hostility to that policy, AT&T actively sought regulation, jogging government and the public in that direction. But this study is not just a restatement of the interest-group-capture theory, as offered by such economists as Stigler or historians as Kolko. Regulation resulted from the convergence of interests of many affected players, including residential and business telephone subscribers, the independent telephone companies that competed with AT&T, and the state and federal governments, as well as AT&T. I employ a multiple interest theory to account for telephone regulation, but unlike other studies using such a framework, I suggest that government is an independent actor with impact on the final policy outcome, and not merely an arena where private interests battle for control over policy outcomes, as is so common among other multiple interest studies of regulation.


2021 ◽  
Vol 27 (1) ◽  
pp. 125-157
Author(s):  
Mohammed A. Alrubaidi ◽  
Nabil Hassan Abdo Al-Hemyari

This study aimed to assess the impact of information technology risks on security of information systems by following an analytical method based on the structural equation modeling (SEM). The study population was seven telecommunication companies in Yemen. A questionnaire was distributed to 356 participants, but only 218 forms were valid for analysis. The data was analyzed by the partial least squares (PLS). The study findings revealed that information technology risks had a negative impact on the security of information systems. The study recommended that the security of information systems should be strengthened so as to maintain the confidentiality of information, its availability and safety from risks, and to cope with speedy developments in information and communication technology.


Sign in / Sign up

Export Citation Format

Share Document