Based on several research projects and close co-operation with leading security providers and their customers, we have identified some gaps between security providers' and customers' views on security. Currently, security providers seek to offer more and more comprehensive security solutions, whereas customers are not automatically willing to commit themselves to one security provider. For a service provider, it seems to be a challenge to understand specific customer needs and benefits related to security services. Marketing of security solutions is mainly based on negative arguments, i.e. risks, threats etc., whereas customers would welcome more positive outcomes, i.e. promises of good functionality and financial benefits. How the customer...
Servitization. It can be seen in all branches and it seems as if every company is shifting towards a...
Previous studies have acknowledged that service encounters are one of the critical determinants of c...
This paper focuses on the service composition based on security properties of services from an end u...
Based on several research projects and close co-operation with leading security providers and their ...
This report is a collection of research papers written in a three-year research project addressing c...
Market interest in security products and services is continuous, but only little research has covere...
Market interest in security products and services is continuous, but only little research has covere...
Outsourced security services are an essential part of business and risk-management strategy in almos...
The private security industry has witnessed dramatic growth during the past few decades, but despite...
The private security industry has witnessed dramatic growth during the past few decades, but despite...
This paper describes the Finnish security business sector through the lens of market and customer or...
This paper describes the Finnish security business sector through the lens of market and customer or...
Although customer value of business-to-business service is by definition determined by the customer,...
Although customer value of business-to-business service is by definition determined by the customer,...
The market for business-to-business security services is broad, yet highly competitive and price-sen...
Servitization. It can be seen in all branches and it seems as if every company is shifting towards a...
Previous studies have acknowledged that service encounters are one of the critical determinants of c...
This paper focuses on the service composition based on security properties of services from an end u...
Based on several research projects and close co-operation with leading security providers and their ...
This report is a collection of research papers written in a three-year research project addressing c...
Market interest in security products and services is continuous, but only little research has covere...
Market interest in security products and services is continuous, but only little research has covere...
Outsourced security services are an essential part of business and risk-management strategy in almos...
The private security industry has witnessed dramatic growth during the past few decades, but despite...
The private security industry has witnessed dramatic growth during the past few decades, but despite...
This paper describes the Finnish security business sector through the lens of market and customer or...
This paper describes the Finnish security business sector through the lens of market and customer or...
Although customer value of business-to-business service is by definition determined by the customer,...
Although customer value of business-to-business service is by definition determined by the customer,...
The market for business-to-business security services is broad, yet highly competitive and price-sen...
Servitization. It can be seen in all branches and it seems as if every company is shifting towards a...
Previous studies have acknowledged that service encounters are one of the critical determinants of c...
This paper focuses on the service composition based on security properties of services from an end u...