Sports Management, Project Management, and Sports Event Management

Author(s):  
Anestis Fotiadis

Event management requires the use of project management and organizational skills to envision, plan, and execute social and business events. It involves studying the brand, identifying its target audience, devising the event concept, and coordinating the technical aspects before actually launching the event. Individuals who develop expertise in event management work in principle with budgets, schedules, and vendors and third-party service providers, and community stakeholders guaranty that they create successful events that meet the needs of their organization or the expectations of their client.

2016 ◽  
Vol 5 (1) ◽  
Author(s):  
Karuna Devi Mishra ◽  
Dr. Sudarsanam

This paper investigates the current challenges faced by the project managers in creating realistic expectations of customers in dynamic changing project environment which are created by rapid introduction of new unknowns, as they progress. One might say they are more akin to packing boxes of frogs without a cover, setting each thing right before a new challenge is faced. The difficulties posed by these projects are identified and the literature is reviewed for suitable approaches. Why do projects fail and what more is critical to the success of project? All projects are conceived with a vision to satisfy certain needs of the business. Hence, the beneficiary of these needs become key stakeholder. Appropriate participation of this key stakeholder in steering the project ensures the success of the project. Also businesses are impacted by competition and changing market place resulting in skewed expectation management. Managing expectations enhances the success of the project immensely. Now, goal of the project plays a pivotal role and hence respecting it, is an important task, in project management. Project governance is an important aspect which needs to change according to the requirements and requires a dynamic approach rather than a ‘rule book approach’.


Author(s):  
Jin Han ◽  
Jing Zhan ◽  
Xiaoqing Xia ◽  
Xue Fan

Background: Currently, Cloud Service Provider (CSP) or third party usually proposes principles and methods for cloud security risk evaluation, while cloud users have no choice but accept them. However, since cloud users and cloud service providers have conflicts of interests, cloud users may not trust the results of security evaluation performed by the CSP. Also, different cloud users may have different security risk preferences, which makes it difficult for third party to consider all users' needs during evaluation. In addition, current security evaluation indexes for cloud are too impractical to test (e.g., indexes like interoperability, transparency, portability are not easy to be evaluated). Methods: To solve the above problems, this paper proposes a practical cloud security risk evaluation method of decision-making based on conflicting roles by using the Analytic Hierarchy Process (AHP) with Aggregation of Individual priorities (AIP). Results: Not only can our method bring forward a new index system based on risk source for cloud security and corresponding practical testing methods, but also can obtain the evaluation result with the risk preferences of conflicting roles, namely CSP and cloud users, which can lay a foundation for improving mutual trusts between the CSP and cloud users. The experiments show that the method can effectively assess the security risk of cloud platforms and in the case where the number of clouds increased by 100% and 200%, the evaluation time using our methodology increased by only by 12% and 30%. Conclusion: Our method can achieve consistent decision based on conflicting roles, high scalability and practicability for cloud security risk evaluation.


Network ◽  
2021 ◽  
Vol 1 (2) ◽  
pp. 75-94
Author(s):  
Ed Kamya Kiyemba Edris ◽  
Mahdi Aiash ◽  
Jonathan Loo

Fifth Generation mobile networks (5G) promise to make network services provided by various Service Providers (SP) such as Mobile Network Operators (MNOs) and third-party SPs accessible from anywhere by the end-users through their User Equipment (UE). These services will be pushed closer to the edge for quick, seamless, and secure access. After being granted access to a service, the end-user will be able to cache and share data with other users. However, security measures should be in place for SP not only to secure the provisioning and access of those services but also, should be able to restrict what the end-users can do with the accessed data in or out of coverage. This can be facilitated by federated service authorization and access control mechanisms that restrict the caching and sharing of data accessed by the UE in different security domains. In this paper, we propose a Data Caching and Sharing Security (DCSS) protocol that leverages federated authorization to provide secure caching and sharing of data from multiple SPs in multiple security domains. We formally verify the proposed DCSS protocol using ProVerif and applied pi-calculus. Furthermore, a comprehensive security analysis of the security properties of the proposed DCSS protocol is conducted.


2021 ◽  
Vol 13 (13) ◽  
pp. 7354
Author(s):  
Jiekun Song ◽  
Xiaoping Ma ◽  
Rui Chen

Reverse logistics is an important way to realize sustainable production and consumption. With the emergence of professional third-party reverse logistics service providers, the outsourcing model has become the main mode of reverse logistics. Whether the distribution of cooperative profit among multiple participants is fair or not determines the quality of the implementation of the outsourcing mode. The traditional Shapley value model is often used to distribute cooperative profit. Since its distribution basis is the marginal profit contribution of each member enterprise to different alliances, it is necessary to estimate the profit of each alliance. However, it is difficult to ensure the accuracy of this estimation, which makes the distribution lack of objectivity. Once the actual profit share deviates from the expectation of member enterprise, the sustainability of the reverse logistics alliance will be affected. This study considers the marginal efficiency contribution of each member enterprise to the alliance and applies it to replace the marginal profit contribution. As the input and output data of reverse logistics cannot be accurately separated from those of the whole enterprise, they are often uncertain. In this paper, we assume that each member enterprise’s input and output data are fuzzy numbers and construct an efficiency measurement model based on fuzzy DEA. Then, we define the characteristic function of alliance and propose a modified Shapley value model to fairly distribute cooperative profit. Finally, an example comprising of two manufacturing enterprises, one sales enterprise, and one third-party reverse logistics service provider is put forward to verify the model’s feasibility and effectiveness. This paper provides a reference for the profit distribution of the reverse logistics.


2021 ◽  
pp. 1-12
Author(s):  
Gokay Saldamli ◽  
Richard Chow ◽  
Hongxia Jin

Social networking services are increasingly accessed through mobile devices. This trend has prompted services such as Facebook and Google+to incorporate location as a de facto feature of user interaction. At the same time, services based on location such as Foursquare and Shopkick are also growing as smartphone market penetration increases. In fact, this growth is happening despite concerns (growing at a similar pace) about security and third-party use of private location information (e.g., for advertising). Nevertheless, service providers have been unwilling to build truly private systems in which they do not have access to location information. In this paper, we describe an architecture and a trial implementation of a privacy-preserving location sharing system called ILSSPP. The system protects location information from the service provider and yet enables fine grained location-sharing. One main feature of the system is to protect an individual’s social network structure. The pattern of location sharing preferences towards contacts can reveal this structure without any knowledge of the locations themselves. ILSSPP protects locations sharing preferences through protocol unification and masking. ILSSPP has been implemented as a standalone solution, but the technology can also be integrated into location-based services to enhance privacy.


Author(s):  
Wei Zhang ◽  
Yifan Dou

Problem definition: We study how the government should design the subsidy policy to promote electric vehicle (EV) adoptions effectively and efficiently when there might be a spatial mismatch between the supply and demand of charging piles. Academic/practical relevance: EV charging infrastructures are often built by third-party service providers (SPs). However, profit-maximizing SPs might prefer to locate the charging piles in the suburbs versus downtown because of lower costs although most EV drivers prefer to charge their EVs downtown given their commuting patterns and the convenience of charging in downtown areas. This conflict of spatial preferences between SPs and EV drivers results in high overall costs for EV charging and weak EV adoptions. Methodology: We use a stylized game-theoretic model and compare three types of subsidy policies: (i) subsidizing EV purchases, (ii) subsidizing SPs based on pile usage, and (iii) subsidizing SPs based on pile numbers. Results: Subsidizing EV purchases is effective in promoting EV adoptions but not in alleviating the spatial mismatch. In contrast, subsidizing SPs can be more effective in addressing the spatial mismatch and promoting EV adoptions, but uniformly subsidizing pile installation can exacerbate the spatial mismatch and backfire. In different situations, each policy can emerge as the best, and the rule to determine which side (SPs versus EV buyers) to subsidize largely depends on cost factors in the charging market rather than the EV price or the environmental benefits. Managerial implications: A “jigsaw-piece rule” is recommended to guide policy design: subsidizing SPs is preferred if charging is too costly or time consuming, and subsidizing EV purchases is preferred if charging is sufficiently fast and easy. Given charging costs that are neither too low nor too high, subsidizing SPs is preferred only if pile building downtown is moderately more expensive than pile building in the suburbs.


2021 ◽  
Vol 13 (1) ◽  
pp. 20-39
Author(s):  
Ahmed Aloui ◽  
Okba Kazar

In mobile business (m-business), a client sends its exact locations to service providers. This data may involve sensitive and private personal information. As a result, misuse of location information by the third party location servers creating privacy issues for clients. This paper provides an overview of the privacy protection techniques currently applied by location-based mobile business. The authors first identify different system architectures and different protection goals. Second, this article provides an overview of the basic principles and mechanisms that exist to protect these privacy goals. In a third step, the authors provide existing privacy protection measures.


2013 ◽  
Vol 03 (08) ◽  
pp. 11-19
Author(s):  
Suhana Mohezar ◽  
Azmin Azliza Aziz ◽  
Mohd Aidil Riduan Kader Awang

This paper aims to examine the factors influencing successful logistics information technology (LIT) among third-party logistics (3PL) service providers. Cross-sectional data from 136 Malaysian 3PL service providers were collected. Our findings indicate that the existence of technological capability, top management support, effective enterprise-wide communication and business process reengineering are pertinent. Nonetheless, the result demonstrate that firm size do not play a role in such initiative.


Sign in / Sign up

Export Citation Format

Share Document