communication

110
LAPPEENRANTA UNIVERSITY OF TECHNOLOGY Department of Business Administration Supply management INTRA-ORGANIZATIONAL USE OF COMMUNICATION TOOLS IN VALUE NETS– CASES FROM THE ICT INDUSTRY The Department Council of the Department of Business Administration has approved the subject of the thesis on March 15 th 2001. Examiner: Professor Veli-Matti Virolainen Instructor: Liisa-Maija Sainio Lappeenranta 15.8.2001 Tiina Ojala Valtakatu 7 as 4 53600 Lappeenranta Tel. +358 50 593 5393

Upload: jauspher

Post on 28-Nov-2014

864 views

Category:

Documents


3 download

TRANSCRIPT

Page 1: Communication

LAPPEENRANTA UNIVERSITY OF TECHNOLOGY

Department of Business Administration

Supply management

INTRA-ORGANIZATIONAL USE OF COMMUNICATION TOOLS IN VALUE NETS–

CASES FROM THE ICT INDUSTRY

The Department Council of the Department of Business Administration has approved the subject of the thesis on March 15th 2001. Examiner: Professor Veli-Matti Virolainen Instructor: Liisa-Maija Sainio Lappeenranta 15.8.2001 Tiina Ojala Valtakatu 7 as 4 53600 Lappeenranta Tel. +358 50 593 5393

Page 2: Communication

ABSTRACT Author: Ojala, Tiina

Title: Intra-organizational use of communication tools in value nets –

Cases from the ICT industry

Department: Department of Business Administration

Year: 2001

Master’s Thesis. Lappeenranta University of Technology.

109 pages, 22 figures, 11 tables and 3 appendices.

Examiner: Professor Veli-Matti Virolainen

Key words: Value net, communication tools, the Internet, the Web, Intranet,

Extranet, ICT industry

Hakusanat: Arvoverkosto, kommunikointivälineet, internet, web, intranet,

extranet, informaatio- ja kommunikaatioteknologian toimiala

The objective of this Master’s Thesis was to study the current state of internal communication in the case companies. These companies belonged to two case value nets in the ICT industry. The internal prospect was chosen as research subject because it creates the base for external, inter-organizational, communication. Particular attention was paid to the Web-based communication and its features as a communication tool in a value net. The research process followed both the qualitative as well as quantitative methods. The quantitative part of the study was implemented as a Web survey whose results revealed that communication in the case companies was mainly based on the use of traditional communication tools. In other words, the utilization of the Web for communication was quite low on which several factors have an influence. However, the Web has several features that improve communication in a value net and they should be considered when planning a universal communication system for the value net. In the theoretical part of this thesis the classification of communication tools was defined. The classification was based on the determination of interactivity related to communication. Additionally, the concept of a value net was described. The proceeding of the Web survey was explained in the beginning of the empirical part, and after that the discussion moved on to the results of the survey. The final chapter in the end of the thesis concluded the main findings and suggested subjects for further research.

Page 3: Communication

TIIVISTELMÄ Tekijä: Ojala, Tiina

Nimi: Yrityksen sisäinen kommunikointivälineiden käyttö

arvoverkostossa – Caset informaatio- ja

kommunikaatioteknologian alalta

Osasto: Kauppatieteiden osasto

Vuosi: 2001

Pro gradu -tutkielma. Lappeenrannan teknillinen korkeakoulu.

109 sivua, 22 kuvaa, 11 taulukkoa and 3 liitettä.

Tarkastaja: Professori Veli-Matti Virolainen

Hakusanat: Arvoverkosto, kommunikointivälineet, internet, web, intranet,

extranet, informaatio- ja kommunikaatioteknologian toimiala

Key words: Value net, communication tools, the Internet, the Web, Intranet,

Extranet, ICT industry

Tutkimuksen tavoitteena oli selvittää sisäisen kommunikoinnin tilannetta case-yrityksissä. Yritykset kuuluvat kahteen case-arvoverkostoon, jotka toimivat informaatio- ja kommunikaatioteknologian alalla. Sisäinen kommunikointi valittiin tutkimusalueeksi, koska se muodostaa perustan ulkoiselle, yritysten väliselle kommunikoinnille. Tutkimuksen painopiste oli web-pohjaisessa kommunikoinnissa ja webin ominaisuuksissa arvoverkoston näkökulmasta. Tutkimusprosessissa käytettiin sekä kvalitatiivisia että kvantitatiivisia menetelmiä. Tutkimuksen kvantitatiivinen osa toteutettiin web-kyselynä, jonka tulokset osoittivat, että case-yritysten sisäinen kommunikointi perustuu pääasiassa perinteisten kommunikointivälineiden käyttöön. Toisin sanoen, webin hyödyntäminen on vähäistä, mihin vaikuttavat monet eri tekijät. Webissä on kuitenkin useita ominaisuuksia, jotka parantavat kommunikointia arvoverkostossa ja siksi nämä web-pohjaiset välineet tulisi huomioida, kun suunnitellaan yleistä kommunikointijärjestelmää. Tutkimuksen teoreettisessa osassa määriteltiin vuorovaikutteisuus-ominaisuuteen perustuva kommunikointivälineiden luokittelu. Tämän lisäksi määriteltiin myös arvoverkoston käsite. Empiirinen osa koostui web-kyselyn toteutuksen ja tulosten raportoinnista, jonka jälkeen yhteenveto kappale koosti merkittävimmät havainnot sekä mahdolliset jatkotutkimusaiheet.

Page 4: Communication

FOREWORD

I would like to thank a few persons who have been involved with the project of

my Master’s Thesis. First of all, I appreciated the possibility to work with this

interesting research subject and therefore I am grateful for Telecom Business

Research Center, and particularly professor Veli-Matti Virolainen, of the

assignment. Secondly, I have Liisa-Maija Sainio and Sami Saarenketo to thank for

their advice as well as encouragement during the research project. Their assistance

has been of importance for me. Additionally, I am grateful for professor Kaisu

Puumalainen and Sanna Taalikka of their help with the Web survey. Last but not

least I would like to thank my husband Jarkko who has always believed in me and

also supported by saying “Things do always work out.”

Page 5: Communication

TABLE OF CONTENT

1 INTRODUCTION ......................................................................................... 1

1.1 BACKGROUND TO THE SUBJECT OF THE STUDY......................................... 1

1.2 SUBJECT AND OBJECTIVES OF THE STUDY AND RESEARCH PROBLEMS....... 4

1.3 LITERATURE SURVEY................................................................................ 6

1.4 THEORETICAL FRAMEWORK.................................................................... 10

1.5 DELIMITATIONS ...................................................................................... 14

1.6 KEY DEFINITIONS .................................................................................... 15

1.7 METHODOLOGY OF THE STUDY............................................................... 18

1.8 STRUCTURE OF THE THESIS ..................................................................... 20

2 COMMUNICATION TOOLS AND A VALUE NET.............................. 22

2.1 WHAT IS A VALUE NET ............................................................................ 22

2.2 TYPES OF COMMUNICATION TOOLS ......................................................... 28

2.2.1 Interactive communication tools.................................................... 29

2.2.2 Non-interactive communication tools............................................ 31

2.2.3 Web-based communication tools ................................................... 32

2.3 CHALLENGES FOR THE COMMUNICATION TOOLS IN A VALUE NET ........... 40

2.4 ROLE OF THE WEB-BASED COMMUNICATION TOOLS IN A VALUE NET ..... 43

2.4.1 Motives for the use of the Web....................................................... 44

2.4.2 Vulnerabilities in the use of the Web ............................................. 47

2.5 SUMMARY............................................................................................... 49

3 USE OF COMMUNICATION TOOLS IN THE CASE

ENVIRONMENT ................................................................................................ 54

3.1 PRESENTATION OF THE INFORMATION AND COMMUNICATION

TECHNOLOGY INDUSTRY AND THE CASES ............................................................ 54

3.1.1 Typical features of the ICT industry .............................................. 56

3.1.2 Buyer A and its case value net ....................................................... 59

3.1.3 Buyer B’s and its case value net .................................................... 60

3.2 IMPLEMENTATION OF THE WEB SURVEY................................................. 62

3.2.1 Research frame.............................................................................. 63

Page 6: Communication

3.2.2 Compilation of the questionnaire .................................................. 67

3.2.3 Challenges related to the implementation of the Web survey........ 69

3.2.4 Time schedule of the Web survey................................................... 73

3.3 RESULTS ................................................................................................. 74

3.3.1 Case A............................................................................................ 77

3.3.2 Case B............................................................................................ 83

3.3.3 Summary ........................................................................................ 88

4 SUMMARY AND MAIN FINDINGS........................................................ 91

REFERENCES

APPENDICES

Page 7: Communication

LIST OF FIGURES

Figure 1. Allocation of the supply chain strategy in connection with product and

design strategy ................................................................................................. 3

Figure 2. Theoretical framework of the study ....................................................... 13

Figure 3. Delimitation of the study........................................................................ 15

Figure 4. Some examples of the Internet-based applications ................................ 17

Figure 5. Main dynamics behind the change from a value chain to a value net.... 23

Figure 6. Transforming value chains into value nets............................................. 24

Figure 7. Classification of the communication tools in this study ........................ 29

Figure 8. Web-based applications from the buyer's point of view with key

relationship types. .......................................................................................... 33

Figure 9. Formation of a virtual private network. Case European Network

Exchange........................................................................................................ 39

Figure 10. Location of communication tools in a value chain .............................. 40

Figure 11. Location of communication tools in a value net .................................. 41

Figure 12. Differences between the ways to communicate in a dyadic partnership

and a network structure.................................................................................. 42

Figure 13. Ideal model of the Web-based communication in a value net ............. 52

Figure 14. ICT cluster framework ......................................................................... 55

Figure 15. Discrepancies between the ICT and the process industry.................... 58

Figure 16. Buyer A's value net in this study.......................................................... 60

Figure 17. Buyer B's value net in this study.......................................................... 61

Figure 18. Limitation of the target group of the Web survey................................ 66

Figure 19. Proceeding of the Web survey ............................................................. 73

Figure 20. Availability of communication tools - Case A..................................... 78

Figure 21. Availability of communication tools - Case B ..................................... 84

Figure 22. Three internally most used communication tools in the case companies

....................................................................................................................... 89

Page 8: Communication

LIST OF TABLES

Table 1. Structure of the thesis .............................................................................. 20

Table 2. The amount of communication ways in a value net ................................ 43

Table 3. Classification of the communication tools studied in this thesis ............. 53

Table 4. Sample of the Web survey....................................................................... 67

Table 5. Differences in the response rates between the case value nets ................ 76

Table 6. Use of the interactive, non- interactive and Web-based communication

tools in own company - Case A..................................................................... 79

Table 7. Use of the Web-based communication tools in own company – Case A 81

Table 8. Use of the specific communication tools in own company – Case A ..... 82

Table 9. Use of the interactive, non- interactive, and Web-based communication

tools in own company - Case B ..................................................................... 85

Table 10. Use of the Web-based communication tools in own company – Case B

....................................................................................................................... 86

Table 11. Use of the specific communication tools in own company – Case B.... 87

Page 9: Communication

1

1 INTRODUCTION

The increasing interest in achieving and sustaining competitive advantage has

heightened the need for different forms of business-to-business co-operation.

Many researchers, such as Parolini (Parolini, 1999), Bovet and Martha (Bovet &

Martha, 2000c) and Andrews and Hahn (Andrews & Hahn, 1998), have studied

the concept of a value net as a certain form of inter-organizational collaboration.

In addition to several other factors, the importance of open and fluent

communication between the counterparts has been broadly stressed. Nevertheless,

only a few researchers have examined communication in practice. Moreover,

rather less attention is paid to the influences of the Web on the ways to

communicate in business networks.

Therefore, the purpose of the present study is to provide information about the

current state of the availability and the use of communication tools in the case

value nets. This study focuses on investigating internal communication that

happens in the case companies as well as the role of the Web in communication.

The internal aspect is chosen to the research subject due to its nature as a basis for

external communication between the members in a value net.

This thesis belongs to the research project of “Information Technology in

Business Relationships” in Te lecom Business Research Center Lappeenranta. The

project is implemented in co-operation with the University of Jyväskylä and the

companies operating in the industry of information and communication

technology.

1.1 Background to the subject of the study

Companies have noticed that satisfaction of the needs of their end-customers is of

crucial importance. The reason why supply chains are transforming into value

networks lies in the changes in environmental conditions and their impact on

Page 10: Communication

2

business. Political and economical changes, such as the formation of the European

Union (The European Union, 2001) and World Trade Association – WTO / Gatt

(World Trade Organization, 2001), structural change in the public sector,

globalization, changes in legislation and co-operation agreements, and finally, the

overall economic growth have forced the companies to re-organize their functions

to retain their competitive advantage (Saunders, 1997, 52-65). The five competitive

forces in Porter’s framework (Porter, 1985, 5) are going to meet with the change, so

that instead of five distinct rivals - competitors, substitutes, customers, new

entrants, and suppliers - the company collaborates with its suppliers and customers,

and thus, the competition happens between company networks, instead of between

single companies.

Environmental changes also affect the role of purchasing in a company.

Traditionally, purchasing has been perceived as a supporting function to marketing

and production. Bidding of suppliers and achieving of the lowest prices possible

have been the main tasks of purchasing department in a company. However, as the

role and the nature of purchasing were expanded, it was noticed that purchasing and

its co-operation with other departments were significant factors in a company’s

ability to compete (Saunders, 1997, 137-139). As Saunders states “Supply base

management and supplier development on a long-term basis, tied to manufacturing

and engineering strategies, have the potential to contribute to the achievement of

these [cost reductions, improvements in quality and delivery, faster time-to-market

and customer responsiveness] aims. (Saunders, 1997, 138)”

Figure 1 describes the connections between product – manufacturing - strategy and

design – engineering - strategy linked to the supply chain strategy. ”Product

strategies establish the basic task for the supply chain, which, therefore,

encompasses both internal and external activities. They include the determination of

priorities, with regard to product objectives, needed to meet customer requirements

and to beat the offerings of competitors. Differentiated strategies, with regard to

quality, cost, time and product innovation, impose different requirements on the

supply chain. They should play an important part in the design and development of

Page 11: Communication

3

both the structural and infrastructural features of the supply chain.” (Saunders,

1997, 150)

Figure 1. Allocation of the supply chain strategy in connection with product and

design strategy

(Source: Saunders, 1997, 150)

The structural features encompass the fundamental physical activities. The

infrastructural features, in turn, cover aspects which are related to controlling the

operation of the physical system, and include planning and control systems,

human resource policies and communication approaches. (Saunders, 1997, 151)

The framework attempts to show the need to maintain integrated control of the

supply chain and to provide the interface between internal operations and those

Page 12: Communication

4

conducted by members on both upstream1 and downstream sides (Saunders, 1997,

151). All of the three strategies – product, design and supply chain – are required

to fit in with each other as well as with the business and technology strategy of the

company. By capturing the benefits and advantages of the operations related both

to purchasing and marketing, the company uses its resources reasonably and it is

able to achieve its objectives.

The companies need different forms of collaboration to combine both their internal

and external strategies, and therefore, to co-operate with their partners. One of these

forms of collaboration is a value net. With good internal and external relationships,

based on such intangibles as trust and open communication and mutual sharing of

information, the value net is a significant alternative of collaboration to achieve

competitive advantage for business. What comes to the formation and the operation

of the value net, information technology can be named as one of the key enablers.

1.2 Subject and objectives of the study and research problems

Firms have to re-organize or even re-build their collaborative and communicative

networks to retain the competitive advantage in the market. Information and its

transfer, in other words communication, is the driving force behind the chain,

coordinating actions, while freeing them from time and space and potentially

involving customers in the supply process (Chandrashekar & Schary, 1999).

However, before companies can re-organize their ways to communicate, they have

to clarify the baseline related to the availability and the use of communication tools

for the possible improvements.

Therefore, the subject of the study is “Intra-organizational use of communication

tools in value nets – Cases from the ICT industry”. The availability and the use of 1 Upstream and downstream markets are concepts linked to the consideration of a supply chain.

Customers of the company are called downstream markets, and thus the upstream markets are

suppliers. (Karrus, 1998, 14)

Page 13: Communication

5

communication tools are described, and particular attention is paid to the Web-

based mediums. This study reviews two different cases from the ICT – information

and communication technology - industry and compares affinities as well as

differences between these cases.

The aim of this study is to create a report of the present availability and the

internal use of communication tools in the case companies in the case value nets.

The report is based on the results from the questionnaire survey and the findings

from interviews. Additionally, the purpose of the thesis is to create the base for

the development of value net communication in connection with the project

“Information Technology in Business Relationships”. Suggestions for further

improvements are presented.

Another concrete objective of this study is to examine the use of the Web in

implementation of the questionnaire survey. The use of the Web is a useful

experience when reviewing the benefits and difficulties related to the utilization of

the Internet technology.

As the main idea of this thesis is to investigate the current state of internal

communication in the case companies, and therefore the main research problem of

this study is defined in the following way:

How are communication tools used internally in the companies of the value

nets?

The main problem can be separated to the sub-problems (Home, 1994, 15). In this

study the main research problem is divided into theoretical and empirical sub-

problems:

??Theoretical sub-problems

1. What is a value net?

2. How to classify communication tools?

Page 14: Communication

6

3. How to study the role of the Web-based tools among the other

communication tools?

??Empirical sub-problems

1. How to describe the availability of communication tools in the case value

nets?

2. How to explain the current use of communication tools in the case

companies?

3. How to study the role of the Web-based communication tools in the case

companies?

4. How can the Web-based communication tools be used in the

implementation of the survey?

1.3 Literature survey

Literature survey represents previous writings about the subject of the study.

Moreover, literature survey describes the main perspectives and examinations

related to the subject, methodological solutions and consequential results (Hirsjärvi

et al., 2000, 115). In this study the literature survey proceeds as follows: First,

publications related to the supply management and thus networking are reviewed.

After that the literature survey moves on to the publications concerning value nets,

and the role of information technology related to the value networks. Finally,

studies and other publications related to the communication tools are discussed.

Saunders has written a basic publication in which he discusses supply

management and the role of strategic purchasing in business (Saunders, 1997). He

explains in his book that strategic purchasing is a central component of the

management function. In fact, the book from Saunders creates the base for this

study. Additionally, Lamming has researched issues related to the partnerships

(Lamming, 1993) as well as Virolainen in his dissertation (Virolainen, 1998).

They both highlight the fact that partnerships and networking are means to create

competitive advantage, but it is not a solution for every purchasing event. As

Page 15: Communication

7

presented in theoretical framework of this study, the value net is one of the forms

to achieve competitive advantage in the market.

Ollus et al. have examined the management of network organizations (Ollus et al.,

1999). They have studied the Finnish manufacturing industry and developed a

model of how to manage a network. Findings from their study are adapted also to

this study when considering the concept of a value net. Telecom Business

Research Center currently finished its large project concerning partnerships and

networking, and published a handbook related to the subject. The handbook is

aimed to the Finnish companies and it is based on studies from ICT industry

(Varis, 2001).

Only one dissertation which was in particularly related to purchasing and the ICT

industry was found. Leminen (1999) investigated and interpreted reasons for gaps

in buyer – seller relationships in his dissertation. The focus of his dissertation was

on telecommunication industry and closer review revealed that the gaps are due to

inflexible arrangements between buying and selling companies (Leminen, 1999,

321) Moreover, Leminen explains that to avoid major problems in inter-

organizational relationships, open communication is of very importance to accept

the existence of the insignificant gaps between counterparts.

Porter introduced the concept of a value chain which formed the early base for the

value net thinking (Porter, 1985). Recently, Reingoldt has studied the change from

the previous-mentioned concept of a value chain towards value net thinking

(Reingoldt, 2001). Bovet and Martha, in turn, have also dealt with the structures of

business networks as they have written a managerial book on value nets which

additionally includes several case examples (Bovet & Martha, 2000c). Gattorna has

edited a book which describes the supply chain and the value net on a general level

(Gattorna, 1998). He has also stressed the importance of effective utilization of

information technology in business-to-business collaboration and communication.

The book of Parolini deals with many separate case studies of value nets, and gives

therefore some beneficial perspectives to the formation of the concept of a value net

Page 16: Communication

8

(Parolini, 1999). Additionally, Parolini has investigated background factors

affecting the value net creation as well as interpreted a fundamental value analysis

for companies.

In addition to the books, several articles from various authors were found dealing

with the topic of value net and its features. Andrews & Hahn have explained the

transformation from the supply chain to the value network in their articles

(Andrews & Hahn, 1998; Andrews & Hahn, 1999). Furthermore, they have

discussed typical features of a value network as well as details linked to the

formation of a value net. Besides their publications, Bovet & Martha have written

several articles considering value networks and their characteristics (Bovet &

Martha, 2000a; Bovet & Martha, 2000b). Some case examples and theory of value

networks are included in their publications. Allee, on the other hand, has got

acquainted with value creation, and thus developed an analysis of a value creation

in a value net (Allee, 2000, 36-39). In this study the concept of a value net is

formed on the basis of these references.

Timmers (2000) has approached the subject of value net and new business models

based on it in his book “Electronic commerce – Strategies and Models for

business-to-business Trading”. Timmers discusses topics from the marketing

point of view, but mainly his writings can be adapted to the supply management.

Timmers sees the role of information technology highly important in enabling the

operation of a value net structure. In addition to Timmers, Karjalainen

(Karjalainen, 2000) has studied the linkage between eletronic business models and

their influence on a firm’s business strategies. Karjalainen stress that the

development of information technology, onto which different electronic business

models are based, affect traditional value chains and therefore cause changes in

competitive advantages of the companies. He also highlights that value nets are

created as a result of the changes in the markets, and they are able to rapidly react

to the changes in the end-customers’ needs or competition (Karjalainen, 2000,

91).

Page 17: Communication

9

Only a few articles and studies of the communication tools were found. However,

some surveys on the use of communication tools were available, for example

surveys of Sherer (1999), Larson & Kulchitsky (2000), and Carbone (2000). Sherer

investigated the use of inter-organizational information systems in manufacturing

networks in the year 1999. She approached the subject by a survey from

approximately 20 different industry sectors, and consequently concluded that the

information technology was not a significant enabler in inter-organizational co-

operation at that time. The study of Sherer arises a question of what is the situation

now, two years later.

Larson & Kulchitsky, on their behalf, have studied the use and the impact of

communication tools in purchasing. The survey was made a few of years ago and it

measured the influence of a variety of media on buyer-supplier relationships and

performance. Additionally, it covered purchasing professionals’ preferences for

various communication tools. The statistical results show that the electronic media,

such as EDI, e-mail, and the Internet, were characterized by low utilization (Larson

& Kulchitsky, 2000, 36). Larson & Kulchitsky stress the importance of further

investigations which should be focused on the use of the Internet in business

relationships.

Carbone (2000) has introduced a survey of the use of the Internet and other

communication media among purchasers, which revealed some considerable points.

First, the results of the study show that 67 % of respondents think the Internet will

be used for online communication in the near future. Secondly, the respondents

argued that the travel costs decrease due to the improved communication tools and

effective use of IP networks. Thirdly, the respondents stated that new

communication tools enable more effective and efficient information exchange

between partners than at the moment and thus, stabilize relationships.

The following quotations show that opinions of the influence of the Internet on

business vary a lot. One respondent from the last-mentioned survey was referred as

he had stated, “ the Internet will become the primary means of communicating with

Page 18: Communication

10

suppliers and will replace in-person meetings and even telephone calls, mail and

faxes.” (Carbone, 2000, 74) Contrary to this, another respondent had stated, “The

Internet will become the primary means of transferring data and doing routine

transactions, but in-person and telephone contact will cement good long-term

relationships that give us a strategic edge.” (Carbone, 2000, 75) According to these

statements it can be concluded that it is important to define the role of the Internet

and particularly the Web in a value net and thus to show the significance of the new

Internet-based communication tools.

1.4 Theoretical framework

The purpose of the theoretical framework is to show how the subject of the thesis

is linked to the business administration, and more accurately, to the supply

management. This thesis settles itself to the cross-scientific research area due to

its connection to both supply management and information technology.

The framework aims to define the role of a value net in supply management. In

addition, it also presents the link between the information technology and supply

management. The structure of this chapter is based on the description of the

theoretical framework, as can be seen from figure 2. The numbers in the following

text can be found in figure 2 as they illustrate the theories onto which the

framework is grounded.

Supply management is divided into operative and strategic decisions, which affect

the function of purchasing in a company. The first element in the strategic

decision making of purchasing is to decide whether to make the required product

itself or buy it outside the own company (Virolainen, 1998, 30). Number 1 in

figure 2 shows this phase, and thus directs the scope of this study towards the

distinct types of purchasing. Ellram and Carr (1994) have reviewed literature of

strategic purchasing and accordingly classified three distinct types of purchasing:

specific strategies employed by the purchasing function; the role of purchasing in

supporting the strategies of other functions and those of a firm as a whole; and the

Page 19: Communication

11

utilization of purchasing as a strategic function of the firm (Ellram & Carr, 1994,

10). Although Ellram and Carr have classified functions of purchasing as distinct

operations, it is remarkable to notice that purchasing is presently considered as an

essential part of a firm’s business strategy. Purchasing includes different tasks

depending on the nature of the task at hand but the overall role of purchasing is

profoundly linked to the strategic business issues of the firm.

Number 2 describes the types of purchasing functions and according to the

quotation from Ellram and Carr: “…when purchasing is proactive and operating

at a strategic level, there are major opportunities to achieve a competitive

advantage through strategic purchasing” (Ellram & Carr, 1994, 17), the

framework shifts to the different strategic sourcing options which is marked by

number 3.

Number 3 in the figure reveals that sourcing options vary from various partnering

options (e.g. vertically integrated production, joint ventures) to options offered

from markets (e.g. bidding, spot procurement) (Virolainen, 1998, 39), (Cox, 1996,

63), (Parker & Hartley, 1997, 117). Due to the focus on business-to-business

collaboration, the stage of partnership is taken into closer consideration. As

number 4 in turn shows, the different types of partnerships are situated between

lean supply, parallel sourcing, network sourcing, and reverse marketing

(Virolainen, 1998, 44-65), (Cox, 1996), (Lamming, 1993). The emphasis of this

study is on network sourcing and its possibilities to create competitive advantage

to the companies in the network.

The concept of network sourcing can be defined as follows: “Network sourcing is

the idea that it is possible to create a virtual company at all levels of the supply

chain by engineering multiple-tiered partnership relationships at each stage, but

without moving to vertical integration (Cox, 1996, 64).” As can be seen in figure

2, number 5 illustrates the phase of network sourcing. Number 6, in turn, presents

that a value net is one of the forms of network sourcing. Naturally, there are also

other forms of network collaboration but they are excluded from this study.

Page 20: Communication

12

The stages 6 and 7 consider one of the major concepts of this study. Bovet and

Martha (Bovet & Martha, 2000c), Andrews and Hahn (Andrews & Hahn, 1998),

Timmers (Timmers, 1999), to mention a few, have studied the concept of a value

net that is illustrated as number 6. In addition to those researchers, Reingoldt has

investigated the change from a value chain towards a value net structure in his

thesis (Reingoldt, 2001). The concept of a value net is discussed in a more

accurate way in chapter 2.

What comes to the linkage of information technology to the research subject,

number 8 and 9 represent the connection of information technology to the thesis.

Web-based communication is needed to complement other ways of

communication and simultaneously to make communication between members in

a value net more effective and efficient. As explained in forthcoming chapters, the

Web is based on the Internet. Furthermore, Internet Protocol, IP, enables the

operation of the Internet that can be seen as number 8 in the figure illustrating the

framework.

As a conclusion from the framework, number 10 shows the location of the subject

of this study in the cross-scientific research area. Supply management and

information technology are therefore connected together.

Page 21: Communication

13

Information technology

Supply management

Operative decisions Strategic decisions

Make

Buy

Specific purchasing strategies

Purchasing as a supporting function in the firm

Purchasing as a strategic function of the firm

Network sourcing

Lean supply

Parallel sourcingReverse marketing

Partnership

Markets

Intra-organizational use of communication tools in value nets – Cases from the

ICT industry

Telecommunications technologyIP networks

1)

2)

3)

4)

5)

6)

The concept of a value net

7)Change from a value chain to a value net

8)9)

The Internet

The Web

10)

Information technology

Supply management

Operative decisions Strategic decisions

Make

Buy

Specific purchasing strategies

Purchasing as a supporting function in the firm

Purchasing as a strategic function of the firm

Network sourcing

Lean supply

Parallel sourcingReverse marketing

Partnership

Markets

Intra-organizational use of communication tools in value nets – Cases from the

ICT industry

Telecommunications technologyIP networks

1)

2)

3)

4)

5)

6)

The concept of a value net

7)Change from a value chain to a value net

8)9)

The Internet

The Web

10)

Figure 2. Theoretical framework of the study

Page 22: Communication

14

1.5 Delimitations

This study is a case study research of value nets in the ICT industry and it

concentrates on clarifying the availability and the use of communication tools in

the case companies. Due to the nature of case study advanced generalizations

from empirical study are excluded because the sampling was done as judgment

sampling. The framework presents the delimitations of this study as well as the

subjects that are ignored in this thesis.

As the focus of the study is on the “buyer – suppliers” network, the value net is

considered from the buying company’s point of view. In other words, the

companies are classified as suppliers from separate tiers according to the buyer

(heading) company. To illustrate the hierarchy, the 1st tier supplier has a straight

connection to the buyer, as the 2nd tier supplier is linked to the previous-mentioned

1st tier supplier and so on. In this study Case A concerns the suppliers from the 1st

tier to the 2nd tier suppliers, contrary to Case B which has the levels of the buying

company and three different levels of suppliers. In this thesis the customers are only

seen as the driving force for the function of a value network.

Figure 3 describes the delimitation of the study. The figure illustrates that the focus

of this study is in the buyer-suppliers network, which is marked as gray area in the

picture, and customers are seen merely as end-customers. In this study the end-

customers can be, for example, paying customers or stockholders of the company

(Virolainen, 2001a). The figure shows that companies in a value net are linked to

each other and additionally they are situated in different levels of supplier tiers.

However, this study focuses only on studying internal communication in the case

companies because it creates the base and conditions for the external

communication between distinct members of a value net. In the future the

connections and the use of communication tools between separate value net

companies are examined.

Page 23: Communication

15

BUYER CUSTOMER

2nd TierSupplier

1st Tier Supplier

End-customers

3rd TierSupplier

BUYER CUSTOMER

2nd TierSupplier

1st Tier Supplier

End-customers

3rd TierSupplier

Figure 3. Delimitation of the study

In addition to supply management, the subject of the study is related to

information technology and technically thinking, the limitation concerns the

Internet. Therefore, in this study the Internet is considered only as the enabler for

the operation of the Web-based communication tools that are applications which

are used through the browser to show Web pages.

1.6 Key definitions

This chapter presents the definitions of the main concepts such as value net,

communication, and the Web, which are closely related to the study. In fact, the

definition of some concepts such as “value net” or “communication” is

complicated due to the lack of standardization among business concepts. These

concepts have various meanings depending on the context, or on the speaker or

the author in case. As opposed to the business concepts, it is relevant to notice that

information technologies have accurate definitions, for example, the definition of

the GSM, Global System for Mobile communication, technology is based on the

certain protocols, components, and engineering to enable the GSM operations. In

Page 24: Communication

16

addition, also the Internet has for example the certain protocols, IP-addresses, and

security systems to enable the information transfer. However, business concepts

lack these standard definitions, and thus, the concepts vary according to the

different authors and environments (Kemppainen, 2001). In this study, the

concepts “value net” and “communication” are defined in the following way:

Value net is a company network in which the member companies collaborate and

co-operate together aiming to serve their end-customers with best quality and as

fast and cost-effectively as possible. Additionally in this study, the value net is

defined to consist of more than two parties. In other words, the network has to

have three or more parties to be considered as a value net.

Communication: According to a dictionary, the word “communication” means

the act of communicating; exchange of ideas, conveyance of information. The

word “communication” also signifies that which is communicated, as a letter or

message. In addition, the word “communication” can be understood as means of

communicating, as a highway, telephone, radio, television, etc. (Landau, 1996,

142). Consequently, the word “communication” has many separate meanings

depending on the context.

However, in this study the concept of communication is defined as follows:

Communication is information transfer between two or more persons or larger

entities, such as departments of a firm or inside a firm itself.

Communication tools are the mediums which transfer information from one

place to another, or actually, from a sender to one receiver or several receivers.

In this thesis the communication tools are separated into the interactive and the

non- interactive communication tools. The non- interactive tools are additionally

divided into the Web-based and other communication tools.

The Web (World Wide Web or www): To fully understand the concept of the

Web, its background, the Internet, has to be explained. The Internet is simply the

Page 25: Communication

17

sum of the worldwide inter- linked computer networks linking millions of

computers; peripherals such as printers and large hard disk assemblies; and

communications equipment, including wiring, satellites, routers, repeaters,

switches. A computer network is means such as copper wiring, optical- fiber

wiring, infra-red light, and microwaves, of linking computers so that computers

can communicate with each other. (Blueroom, 2001)

Only with this global network of computers in place is the Web able to exist.

Accordingly, the Web can be defined as follows: a hyper-linked communications

service that operates on top of the Internet's TCP/IP communications technology.

Furthermore, the Web is composed of millions of hyperlinked, graphical Web

pages that may host a wide range of text, image, audio, and video files; on the

other words, it may host the sources of multimedia. (Blueroom, 2001) Figure 4

below describes the difference between the Internet and the Web; the Internet can

be defined as a base for different applications.

The Internet

FTP The Web

E-mailIRC

Bulletin boards

Newsgroups

The Internet

FTP The Web

E-mailIRC

Bulletin boards

Newsgroups

The Internet

FTP The Web

E-mailIRC

Bulletin boards

Newsgroups

Figure 4. Some examples of the Internet-based applications

Interactivity vs. non-interactivity: In this study the interactivity is linked to

communication. Communication is interactive if it happens online and does not

leave any tracks after the event of communication. Non-interactive

Page 26: Communication

18

communication, in turn, leaves tracks due to its documented information transfer.

For example, an e-mail message represents non-interactive communication as a

telephone call illustrates interactive communication.

1.7 Methodology of the study

“Case studies strength is its ability to deal with full variety of evidence –

documents, artifacts, interviews, and observations.” (Yin, 1994, 9) Case study is a

recommended research strategy when “a “how” or “why” questions are being asked

about contemporary set of events over which the investigator has little or no

control” (Yin, 1994, 9). Moreover, Yin quotes Schramm (1971) as he describes the

case study: “it [the case study] tries to illuminate a decision or set of decisions: why

they were taken, how they were implemented, and with what result.” (Yin, 1994,

12) As a conclusion from the previous statements, the case study is the most

obvious method in this study due to the formulation of the research problem: How

are communication tools used internally in the companies of the value nets?

Case study can be used to explain, describe, illustrate, explore, and evaluate the

subject of the study. A process of triangulation facilitates and makes more reliable

to conclude findings in a case study (Yin, 1994, 92). Accordingly, this study uses

both qualitative interviews and quantitative questionnaires to solve the research

problems.

Case studies typically combine data collection methods and the evidence may be

qualitative (e.g. words), quantitative (e.g. numbers), or both (Eisenhardt, 1989,

535). Triangulation provides stronger substantiation of constructs and hypotheses. It

is possible by multiple data collection methods such as archives, interviews,

questionnaire, and observations (Eisenhardt, 1989, 535-538) which not only

examine the same subject from manifold perspectives but also increase

understanding by allowing for new and deeper dimensions to emerge (Jick, 1979,

604). Various references state that qualitative and quantitative methods should be

regarded as complementary rather than as rival research methods. Furthermore, the

Page 27: Communication

19

accuracy of the judgments can be improved by collecting different kinds of data that

consider the same phenomenon (Jick, 1979, 602).

Source material for this study was collected by the reviews from literature and

articles, the Web survey in the case companies, and interviews with representatives

from the case companies. Also related dissertations, proceedings and seminars were

considered as important sources of information for this study.

Articles, publications and other information were collected from various sources

as online article databases, such as Abi/Inform, Ebsco, Emerald, IEEE Xplore -

The Institute of Electrical and Electronics Engineers, Inc., literature, companies’

home pages and other Internet pages, various presentations and studies on the

research subject and related topics. Additionally, publications from different

research centers such as the National Technology Agency in Finland, Telecom

Business Research Center of Lappeenranta University of Technology, The

Research Institute of the Finnish Economy, were reviewed. Occasionally, useful

information was gathered from Elmar’s mailing list which is managed by the

Columbia University. The collection of appropriate material continued during the

study and potential sources were taken into closer consideration. Information was

searched mostly by words such as a value net or a value network, a network

organization, a value chain, the Internet, the Web, an Intranet, an Extranet, IP -

Internet Protocol - networks, (inter-organizational) communication, and (inter-

organizational) information transfer, to mention a few.

The Web survey represented the quantitative method in this study. Usually, a

quantitative study precedes the qualitative study because it creates the base for the

formation of qualitative interviews (Hirsjärvi et al, 2000, 133). The questionnaire

survey collected general data of the research area and thus the focus and the

direction of interviews were made more specific and sharpen. Nevertheless, in this

study the survey and interviews were made simultaneously to get as much

information about the current state as possible. By doing this, both of the methods

complemented each other’s results.

Page 28: Communication

20

A qualitative study aims to describe and explain current practices and to find and

disclose facts of these practices (Hirsjärvi et al., 2000, 161). For the qualitative part

of this study material was collected by interviews, observations and reviews of

literature and articles. The findings obtained with qualitative methods supported the

conclusions made from the questionnaire survey.

1.8 Structure of the thesis

As can be seen from table 1, this study is divided into two main divisions which are

a theoretical part and an empirical part. Furthermore, the theoretical part is

distributed to two separate chapters: (1) Introduction, and (2) Communication tools

and a value net. The empirical part also consists of two chapters: (3) Use of

communication tools in the case environment, and (4) Summary and main findings.

Table 1. Structure of the thesis

Chapter Content of the chapter

Related research questions

Subject terms

1 Introduction Background, Subject and aims of the thesis, Research problems, Literature review, Theoretical framework, Delimitations, Key definitions, Research methods, Structure of the thesis

2 Communication tools and a value net

Definition of the value net, Classification of the communication tools, Challenges for communication in a value net, The role of the Web-based communication tools, Summary of the theoretical part

What is a value net? How to classify communication tools? How to study the role of the Web-based communication tools among the other tools?

Interactive and non-interactive communication, The Web, The Internet, Intranet, Extranet

The

oret

ical

par

t

Page 29: Communication

21

3 Use of communication tools in the case environment

Introduction to the ICT industry, Presentation of the cases, Issues related to the Web survey, Results

How to describe the availability of communication tools is the case value nets? How to explain the current use of communication tools in the case companies? How to study the role of the Web-based communication tools in the case companies? How can the Web-based communication tools be used in the implementation of the survey?

The ICT industry, The Web survey

4 Summary and main findings

Summary of the thesis, Report on the main findings based on the study

How are communication tools used internally in the companies of the value nets?

Em

piri

cal p

art

Introduction to the subject creates the framework for the thesis as well as explains

the key concepts briefly. After the introduction phase the definition of a value net,

the communication tools, and also their division to the interactive and the non-

interactive tools are described. Additionally, some challenges related to

communication in a value net are briefly explained. Then the study moves on to the

discussion of the role of Web-based communication tools in a value net which deals

with the motives and the vulnerabilities related to the Web. Summarizing sentences

of the chapter close the theoretical part of this study.

The empirical part starts by the introduction of the ICT industry, its features and

problems. The cases - Buyer A, Buyer B and the members of their value nets - are

also briefly presented. Moreover, the empirical part consists of explanation of how

the Web survey was implemented among the case companies. In addition to the

implementation phase, the results from the survey are discussed and the most

important findings are highlighted. Finally in the empirical part, and also in the end

of the entire study, the summary and main findings combine together the main

issues related to the theory and the practice. Additionally, some further topics for

future research are presented.

Page 30: Communication

22

2 COMMUNICATION TOOLS AND A VALUE NET

In business-to-business networks companies have many possibilities to use

different communication tools. Each of the tools has its characteristics, and

suitability for different events of communication varies a lot according to the

communication tool in case. Companies have several directions into which to

develop the use of the communication tools, especially the Internet-based ones, in

order to gain more benefits from them.

As the subject of the study refers to the use of communication tools in the

companies of a value net, the concept of a value net has to be explained at first.

Then the types of communication tools are presented as well as challenges that are

related to communication in a value net. Finally in this chapter, the role of the

Web-based communication tools is discussed.

2.1 What is a value net

The concept of a value net is based on Porter’s analysis of a company’s internal

value chain to attain competitive advantage (Porter, 1985, 37). Furthermore,

Porter sees that the interaction of separate companies creates a value system in

which the internal value chains of distinct companies are embedded into one large

value system. The ultimate goal of such a value system is to gain and to sustain

competitive advantage of its members. (Porter, 1985, 34)

As a reconfiguration of the theory of a value chain, some researchers have dealt

with the concept of a value net which is abundantly based on the development of

the information technology (Reingoldt, 2001, 16). Additionally, the collective

impact of other concepts, as core competence, virtual enterprises and total

customer experience, has contributed to the formation of the concept “value net”

(Andrews & Hahn, 1998, 7). In literature value nets are also known as value

networks, value Webs and value constellations (Varis, 2001, 21).

Page 31: Communication

23

Researchers such as Porter (Porter, 1985), Lamming (Lamming, 1993), Cox (Cox,

1996), and Bovet and Martha (Bovet & Martha, 2000c) have dealt with the main

driving forces in the current markets that also have an influence on the change

from a value chain towards a value net. These driving factors of the change are

defined as follows: more demanding customers; the Internet and digital

technology; growing competitive pressure; and globalization. Figure 5 describes

these influencing factors and the direction of their affects.

The concept of a value net

Change from a value chain to a value net

More demanding customers

The Internet and digital technology

Growing competitive pressure

Globalization

Customer aligned Collaborative

Fast flow

Agile and scalable

Digital

The concept of a value net

Change from a value chain to a value net

More demanding customers

The Internet and digital technology

Growing competitive pressure

Globalization

Change from a value chain to a value net

More demanding customers

The Internet and digital technology

Growing competitive pressure

Globalization

Customer aligned Collaborative

Fast flow

Agile and scalable

Digital

Figure 5. Main dynamics behind the change from a value chain to a value net

On the other hand, figure 6 below illustrates the change from the form of a value

chain to the form of a value net. The chain is the set of internal or inter-

organizational processes that produce and deliver goods and services to

customers. Separate functions and operations are part of the value chain process,

but they are seldom included within the value chain organization (Bovet &

Martha, 2000b).

Page 32: Communication

24

Figure 6. Transforming value chains into value nets.

(Source: Andrews & Hahn, 1999, 306)

Within a value net, each enterprise looks like an individual mini-network,

encompassing all of its businesses and partners – strategic, tactical, and virtual

partners and suppliers around the world. Each participant is forced by its

competitive environment to rethink the way it serves and remains close to its

customers and the way in which it develops its products and services with

customers (Andrews & Hahn, 1999, 305). Moreover, Andrews & Hahn offer an

illustrative overview of the term “value net” in one of their articles: “it [the value

net] looks like a web of virtual enterprises that behave like living, ameba- like

organisms – constantly changing shape, expanding, shrinking, multiplying,

dividing, shifting, and mutating.” (Andrews & Hahn, 1998, 7)

A value net is created from several companies linked together in a way that

provides at first value to the end customer, and secondly in a way that guarantees

timely and rapid information exchange among all the members in the net. The

Page 33: Communication

25

fundamental factor that enables a value net requires co-operation and confidence,

not forgetting the basis for functionality – digitization that provides effectiveness

(Ollus et al., 1999).

Every company in a value net concentrates on its core competence. This means

that the focus of the company is on the operations that it can and it knows best. In

other words, the entire network consists of specialized companies which

collaborate together to achieve shared goals. In fact, a value net generates

economic value through complex dynamic exchanges between one or more

enterprises, its customers, suppliers, strategic partners, and the community (Allee,

2000, 37).

A value net combines the advantages of a traditional network and value chain

activities. The former emphasizes joint efforts when achieving efficiency, whereas

the latter focuses more on the value-creating activities. Parolini states that instead

of considering a value net as sets of economic players, it should be seen as sets of

activities that are jointly involved in the creation of value (Parolini, 1999, 59-68).

Timmers defines a value network as a multi-enterprise network of relationships

focused on integration of information flows to exploit information and knowledge

in the network for strategic business objectives.” (Timmers, 1999, 183) Bovet and

Martha, in turn, explain the concept of a value net in the following way: “A value

net is not a sequential, rigid chain. In fact, it is a dynamic, high-performance

network of customer / supplier partnerships and information flows.” (Bovet &

Martha, 2000, 2)

A value net is a network of companies which aims to serve end-customers and

fulfill their diverse needs. A value net has to be able to solve customer problems,

rather that simply sell products; it has also the ability to respond rapidly to

changing customer demands, to build a strong brand based on valuable services,

and to create such a high and professional level of know-how that is difficult, or

even impossible, to damage. “A value net is a business design that uses advanced

Page 34: Communication

26

supply chain concepts to achieve both superior customer satisfaction and company

profitability. A value net is so named because it creates value for all the

participants — the company and its suppliers as well as the end-customers — and

because it's based on a collaborative, often digital, network that links the

numerous parties in the system.” (Mercer Management Consulting, 2001)

According to various sources, an end-customer can be defined, for example, as a

paying customer of the company or a stockholder who expect profit for his/her

investments (Virolainen, 2001a). The concept of an end-customer can also

concern a private investor or a financial institution, suppliers, government, council

or electorate (Saunders, 1997, 30). In other words, an end customer is the last

individual or purchasing group to make product / service differentiation decisions

that cause a supply network to be activated and who might usefully be influenced

(Harland, 2000).

The companies of the value net have to utilize information technology to operate

efficiently and effectively. The solutions of information technology enable fluent

communication and fast information transfer between the separate parties.

Concrete benefits can be seen as shortened lead-times of products and services,

decreased amount of bounded capital and diminished operation costs.

Additionally, information technology reduces transaction costs of obtaining

capabilities externally, while improving core competencies internally. Global

sourcing is also enabled. However, direct revenue and product exchanges are only

part of the important factors in the value net. Knowledge and intangible benefits

are of equal importance, and success depends on building a rich network of

trusted relationships. New technologies are only pipelines for information - data

and knowledge - and value exchange. The exchange of information itself is what

is really important. (Allee, 2000, 38) Therefore can be stated that information

technology is the key enabler of the value nets (Reingoldt, 2001, 17).

Bovet and Martha have studied the characteristics of a value net. The findings of

their study revealed that a value net contains the following features:

Page 35: Communication

27

1) Customer aligned – Customer choice triggers sourcing, building, and

delivery activities within the network.

2) Collaborative – Companies engage suppliers and customers - and

sometimes competitors - in networks of value-creating relationships. Each

activity is assigned to the partner best able to perform it.

3) Agile and scalable – Responsiveness to change is assured through flexible

production, distribution, and information flows. Brick-and-mortar

restraints and capital requirements are minimized. In some cases, the entire

tiers of the traditional supply chain are eliminated. Thus the business can

easily be scaled up to meet growing demand.

4) Fast flow – Order-to-delivery cycles are fast and compressed. Inventories

are often entirely absent. Rapid delivery is connected to reliable and

convenient delivery.

5) Digital – Information technology is a key enabler. Information flows and

its intelligent use form the neural system of the net, connecting customers,

suppliers, and value-adding activities. (Bovet & Martha, 2000b)

Value nets use networked technologies and business processes to form and recast

themselves in response to dynamic customer demands, and simultaneously

optimizing their structure and performance at higher levels of efficiency and

responsiveness. This will require the movement and management of vast amounts

of knowledge in ways and to places not previously feasible or practical. In

addition to the definitions of Bovet and Martha, the value nets display three

characteristics that facilitate the fulfillment of their function. These characteristics

are:

1) Transparent – Value nets contain substantial amounts of information on

capabilities, capacities, inventories, and plans that can be exchanged

between communication tools, servers, and optimizing agents that

complement the human capabilities. It is complicated feedback

phenomenon that requires multilevel scheduling, coordination and

management of parallel resources (Ollus et al., 1999, 151).

Page 36: Communication

28

2) Timely – Value nets are designed to meet the needs of the end-customer –

exactly when the customer wants it. To meet this feature, specified and

related information needs to be available.

3) Tuned – Through collaboration and sharing of knowledge, the value nets

serve the needs of the end-customers with a minimum of wasted effort or

assets. (Cross, 2000, 39)

As a conclusion, fast information delivery can be stated to be one of the key

premises for a value net. Although organizational structure and human thinking

always exist beyond partnerships and collaborative networks, the information

technology is needed to manage and control the network and enable effective and

efficient communication in and between the members of the value net.

2.2 Types of communication tools

For the comparison of different communication tools, a basic classification has to

be done. The classification arguments can vary, for example one of the previous

studies divided the communication tools into personal, mechanical and electric

tools (Larson & Kulchitsky, 2000, 25). On the other hand, the classification of the

communication tools could have been done to the traditional and the Web-based

tools, but then there would have been many defects in the classification

arguments. For example, the classification of the cellular phone and other mobile

devices would have been complicated. Consequently, to make the distinction clear

between the separate tools, the communication mediums are divided into the

interactive and non-interactive communication tools in this study.

The classification of the communication tools is based on the definition, in which

the interactive tools include the mediums that do not leave any tracks of the

communication. Communication just happens and information of it cannot be

returned in any readable form with out additional documentation. Interactive tools

enable real time communication, for example telephone conversation between two

Page 37: Communication

29

or more persons, or videoconferencing with many persons around the world. The

non-interactive tools, on their behalf, consist of mediums that leave tracks related

to communication. Communication happens with visible and readable documents

which can be stored to certain place for further use. Examples of these non-

interactive tools are mailings or the Internet pages.

Figure 7 describes the classification system of the communication tools. The same

figure also highlights the stress of this study which is on the Web-based tools. The

differences between two classes of communication tools are discussed, as well as

their positive and negative features. Particular attention is addressed to the

characteristics and possibilities of the Web-based tools such as the Internet,

Intranet and Extranet.

Communication tools

Non-InteractiveInteractive

OthersWeb-based

Communication tools

Non-InteractiveInteractive

OthersWeb-based

Figure 7. Classification of the communication tools in this study

Before the presentation of the communication tools, the following chapter

describes the challenge which the communication tools face in the value net

structure. After that, the following two chapters explain both of the concepts of

the interactive and non- interactive tools.

2.2.1 Interactive communication tools

The interactive communication tools enable online and thus, real time

communication. The word interact has the meaning “to act on each other”

(Landau, 1996, 374), or “to have an effect on each other or something else by

being or working close together” (Longman, 1987, 547). Usually, interactive

Page 38: Communication

30

communication happens when the exchange of information is informal, that is the

situation when information is not written in any readable form or it is not

documented in any way. Although interactive communication is fast, the lack of

readable information may, however, cause problems because that certain

information may be needed somewhere else later.

Based on the description above, it can be stated that the main criterion for

interactive communication tools is that communication with these tools is bound

to certain, mutual shared and committed time when communication can happen,

and additionally, it is a certain kind of an iteration process. According to the

dictionary, the iteration as a concept means “to utter or do again some problem

and thus approach the decision” (Landau, 1996, 384), but to fully understand the

meaning of the concept in the context of this study, a simple example is compiled.

It describes the idea of the iteration process related to the discussion of interactive

communication tools.

The example takes a closer look to the situation, in which a dating couple has

decided to go to the cinema. To go to the movie, they should make the first

decision of, at what time, and the second one, into which movie they would like to

go. Because both of these persons have their own opinions about the time and the

movie, they have to bargain on the issue. Now in this case, it is easier to use

interactive than non- interactive communication to get direct feedback from each

other. Thus approaching the solution by iterating the alternatives one after another

away gives separate parties improved possibilities to have an influence on the

decision because during the iterative process one party can immediately refine the

other’s ideas and consequently they get closer to the mutually agreed decision.

Finally, in the end of the interactive discussion they have a common decision of

the movie and the showtime. (Eerola, 2001)

If the iterative process is then transferred to the business environment, the

following example will explain it more: Three separate companies have a project

on software development. Their common customer has certain expectations of the

Page 39: Communication

31

end-product and thus these companies have to collaborate closely to implement

these expected features. As these companies use interactive communication tools

when making important decisions, they can communicate real time and thus

influence on each other’s ideas and opinions due to the direct feedback. If they

used non- interactive communication tools, they had to wait for each other’s

reaction before they could give their own opinion of the topic at hand and the

process of problem solving or decision making would be slower and some vital

considerations could have been missed.

The interactive communication tools studied in this thesis are fixed phone, cellular

phone, video conferencing and face-to-face contact. Communicator and other

comparable devices could have been classified as interactive tools for their phone

features, but due to their additional use for e.g. reading and sending of e-mails,

they belong to the non- interactive communication tools in this study.

2.2.2 Non-interactive communication tools

Contrary to the interactive communication tools, the non-interactive tools do not

require an online connection between the parties who exchange information. The

use of non- interactive communication ignores the assumption of the presence of

the receiver because the information is left available into the non-interactive tool

waiting for suitable time from the receiver to read, and above all, to adapt that

information.

The ability to trace the exchanged information, and moreover, the usability of its

content besides the prevailing receivers, are the main points when discussing the

typical features of non- interactive communication tools. Nevertheless, also some

responsibilities exist when communicating in a non- interactive way: the sender

has to activate himself to carry out the message, and the receiver(s) has to be

active to receipt the message. This fact may cause difficulties in the use of non-

interactive communication tools because persons are required to collect the

information they need.

Page 40: Communication

32

The distribution of information depends on the sender, because he or she can

decide whether to distribute the information or not. Activity is needed to get

connection to the information, and it has to be recognized that this fact may affect

the arrival of the information to the desired person at right time, at right place and

at right format.

The non-interactive communication is for the formal communication due to its

traceability. The documents related to communication are stored in the non-

interactive tools and therefore besides the prevailing receiver, some other persons

may also see the information. In the case of non- interactive communication, the

authentication and authorization of persons is thus of importance.

The non- interactive communication tools studied in this thesis are beeper, SMS -

Short Message Service, fax, mobile devices such as Palm and communicator, e-

mail, FTP – data transfer with File Transfer Protocol, the Internet, the Web-based

versions of the Intranet and the Extranet, electronic bulletin board, electronic

conversation channel, post and mailings. According to the focus of this thesis, the

following chapters describe the Web-based tools and their use in business

operations.

2.2.3 Web-based communication tools

The Internet Protocol networks enable the operation of the Internet and related

applications such as the Web. Internet Protocol – IP - can be explained that it is

the method or protocol by which data is sent from one computer to another on the

Internet (Whatis.com, 2001) The term IP network can also be explained in other

words, for example, Ollus et al. have defined the Internet Protocol to be a standard

protocol for the technical management of a network organization because it

enables worldwide connections through the Internet (Ollus et al., 1999, 151).

It has been stated that the Web has transformed business by largely reducing the

cost of gaining access to information electronically with a free browser and a

Page 41: Communication

33

computer with an access to the Web. Also the value of the exchanged information

has greatly increased from the situation of the dyadic use of EDI to the multiple

exchanges of knowledge through the Internet, and additionally, through the Web,

for example, in terms of viewing images of products, listening seminars and

presentations, implementing video conferencing or even making virtual plant

tours. The influence of the Web can additionally be seen in the size of the

audience that can be reached electronically. (Cross, 2000, 38)

The widely known applications of IP networks are the Internet, as well as

companies’ Intranets and Extranets. These concepts have a varying meaning

depending on the context in case, for example, an Intranet can be a Web-based

portal or only a folder in a shared server (Project workshop, 2001). Figure 8

describes the area of each of these networks, and the following chapters explain

further the Web-based concepts of the Internet, Intranet and Extranet.

groups

-

Customer

Supplier

BuyerIntermediary

Other interest

Business-to business

Mainly business-to-business

Business-to-business or business-to-consumer

the Internet

Intranet

Extranet

groupgroups

-

Customer

Supplier

BuyerIntermediary

Other interest

Business-to business

Mainly business-to-business

Business-to-business or business-to-consumer

the Internet

Intranet

Extranet

group

Figure 8. Web-based applications from the buyer's point of view with key

relationship types.

(Source: Puska, 2000, 15)

Page 42: Communication

34

Figure 8 illustrates the main relationships between the parties and the names of the

Web-based applications from the buyer’s viewpoint. The basic idea of the figure

is from Graham & Hardaker’s article, but slight modifications have been made on

it. (Graham & Hardaker, 2000, 286).

In the figure the buyer’s Intranet is the smallest box around the circle called

“Buyer Intermediary”. It is for the buyer’s distribution of internal information and

other parties do not have access to it. An enlarged version of the buyer’s Intranet

is the Extranet between the buyer and the supplier. This network is for the

management of the business-to-business relationships and it is usually built to

support and ease the partners’ communication. The Extranet exists as a box

surrounding both the supplier’s and the buyer’s circles in figure 8.

The frame of the whole figure illustrates the Internet. Each one of the interest

groups as well as customers, investors, researchers etc. have access to it. In the

Internet the types of relationships vary from business-to-business and business–to-

customer relationships right up to business-to-government relationships.

In fact, the Internet’s bandwidth and ubiquity of access allows migration from a

supply chain with a single serial flow of information to value networks where

visibility and transparency across the network increases the chances that each

participant will be able to choose the optimal partner for every transaction. (Cross,

2000, 39)

The Internet

The Internet is a worldwide network connecting many computer networks and is

based on a common addressing system and communications protocol called

TCP/IP, which is the basic communication language of the Internet. The original

uses of the Internet were electronic mail, file transfer, bulletin boards and

newsgroups, and remote computer access (Telnet). The Web, which enables

simple and intuitive navigation of the Web sites through a graphical interface,

Page 43: Communication

35

expanded broadly during the 1990s and became the most important component of

the Internet (Anonymous, 2000). Also the Internet telephony has been developed

to transfer voice over the Internet (Whatis.com, 2001).

A common definition of the Internet is calling it a public Web site. Its primary

users are both current and potential customers and suppliers, the general public

and other people outside the company. The Internet can be described as a big

welcome mat, where the entrants step first when they get acquainted with the

company for the first time.

Types of available information on a company’s Internet site can be for example:

- Product and service information,

- Contacts such as sales, service, investor relations, media relations, etc.,

- Product and sales support,

- Value-add sections such as mailing lists, interactive areas, open vacancies,

etc.,

- Solutions and success stories. (Ringle, 1999, 16)

Intranet

An Intranet is a private network for internal company use only. Businesses might

deploy Intranets for sharing information and collaborating within the company,

usually insulated from the surrounding Internet by computer-security systems

(Zwass, 2000). Intranet is also an internally focused application used to

disseminate information throughout the company (Riggins & Rhee, 1998, 88). It

is a great advantage to utilize the Web and Intranet in daily processes such as

delivering reports and agendas, plans and proposals, to mention a few. But also

dangers exist in the net. It has to be checked that unauthorized users cannot read,

modify or copy confidential documents that are sent through the Internet.

Page 44: Communication

36

Technically thinking, an Intranet is a private network that is contained within an

enterprise. It may consist of many interlinked local area networks and also use

leased lines in the wide area network. Typically, an Intranet includes connections

through one or more gateway computers to the outside Internet. An Intranet uses

TCP/IP, Hypertext Transfer Protocol, and other Internet protocols and in general

looks like a private version of the Internet. With tunneling, companies can send

private messages through the public network, using the public network with

special encryption/decryption and other security safeguards to connect one part of

their Intranet to another.

Typically, larger enterprises allow users within their Intranet to access the public

Internet through firewall servers that have the ability to screen messages in both

directions so that company security is maintained. When part of an Intranet is

made accessible to customers, partners, suppliers, or others outside the company,

that part becomes part of an Extranet. (Whatis.com, 2001)

Figuratively thinking, an Intranet is a castle surrounded by a moat. To enter the

castle, the entrant must have a suitable access code for the security guard standing

at the door. If he has the right code, he can get in, but if he does not, he is not able

to enter.

These types of applications suit perfectly to the added security and privacy of an

Intranet:

- Company directory,

- Project status reports,

- Budgets and forecasts,

- High- level reporting, such as customer satisfaction issues, supplier

performance data etc.

- Internal files that are meant for staff only, for example minutes of

meetings, summer holiday lists, and so on. (Ringle, 1999, 16)

Page 45: Communication

37

Extranet

Businesses rely frequently also on Extranets, which are extensions of a company’s

Intranet and allow portions of its internal network to be accessed by collaborating

businesses (Zwass, 2000). In fact, an Extranet is a special Web site for partners,

suppliers and vendors. These people and organizations have a closer relationship

with the company’s operations because of their contributions to products and

services delivered to the end-customers. However, their access is more limited

than company employees’.

The real benefit of an Extranet is in its ability to bring together all of the extended

enterprise, serving no longer as just an authorized collection of corporate fact and

data applications, but as the neural center of corporate business transactions.

Bringing counterparts into the information exchange is important to a company’s

quick response and strategic movement as it adapts to a rapidly evolving market

environment (Baker, 2000, 42).

Let us imagine the same castle as in the Internet and Intranet chapters above. This

time the entrant has a right to go to certain, beforehand defined, places. The

entrant has consequently a restricted access to certain rooms in the castle and the

other rooms are only for the company staff.

Technically thinking, an Extranet is a private network that uses the Internet

protocol and the public telecommunication system to securely share part of a

business's information or operations with suppliers, vendors, partners, customers,

or other businesses. The same benefits that Hypertext Markup Language (HTML),

Hypertext Transfer Protocol (HTTP), Simple Mail Transfer Protocol (SMTP), and

other Internet technologies have brought to the Internet and to corporate Intranets

now seem designed to accelerate business between businesses and enable the use

of Extranets. (Whatis.com, 2001)

Page 46: Communication

38

Here are some examples of Extranet applications for business:

- Inventory checking for the sales force or supplier,

- Ordering information with special pricing,

- Partners’ network with private discussion groups or mailing lists,

templates for requisitions,

- Work orders and expenses. (Ringle, 1999, 16)

An Extranet requires security and privacy. These require firewall server

management, the issuance and use of digital certificate or similar means of user

authentication, encryption of messages, and the use of virtual private networks

(VPN) that tunnel through the public network (Whatis.com, 2001). A closer

consideration is only taken to the concept of VPN, and the explanations of the

other terms can be found in appendix I.

A virtual private network is a private data network that makes use of the public

telecommunication infrastructure, maintaining privacy through the use of a

tunneling protocol and security procedures. A virtual private network can be

contrasted with a system of owned or leased lines that can only be used by one

company.

Page 47: Communication

39

Figure 9. Formation of a virtual private network. Case European Network

Exchange.

(Source: ENX, 2001)

European Network Exchange, ENX, operates among automotive industry as it is a

business quality computer communications network which provides secure

communications with a guaranteed service level at a defined high performance

based on the Internet protocol TCP/IP. ENX uses virtual private networks to

enable secure connections between two or more confidential parties. For example,

as figure 9 shows, the partners B and E have a VPN connection to protect their

communication and information exchange from outsiders. Even if partners A, C

and D are connected to the same Extranet, they cannot see into the VPN between

partners B and E due to the encryption technique.

The idea of the VPN is to give the company the same capabilities at much lower

cost by using the shared public infrastructure rather than a private one. Phone

companies have provided secure shared resources for voice messages. A virtual

private network makes it possible to have the same secure sharing of public

resources for data. Companies today are looking at using a virtual private network

for both Extranet and wide-area Intranet. (Whatis.com, 2001)

Page 48: Communication

40

2.3 Challenges for the communication tools in a value net

In a value chain the communication tools are used only between two parties as

figure 10 shows. In this situation the exchange of information to all of the

members in the chain becomes problematical. Usually, communication is

interactive, so that traceability of information is complicated, or even impossible.

In addition to the problem of traceability, the later availability of exchanged

information is not easy due to the lack of storing that information. Also in the case

of non- interactive communication in a value chain the traceability of information

is difficult because communication happens between two counterparts and

outsiders do not have access to their information systems. Only these prevailed

two parties have the exchanged information while other parties are excluded.

Information flow

2nd tier supplier

1st tier supplier

CustomerBuyer End User

COMMUNICATION TOOLS

Information flow

2nd tier supplier

1st tier supplier

CustomerBuyer End User

COMMUNICATION TOOLS

Figure 10. Location of communication tools in a value chain

In a value net the basic requirements for ideal operation of communication are

transparent, timely and tuned flow of information between parties. Therefore, the

arrangement of organizations involved in a value net has to be changed as figure

11 presents. Opposite to the situation in a value chain - as in figure 10, figure 11

describes the location of communication tools in a network structure. To share

Page 49: Communication

41

information between the members of the value net, information has to available

continuously, not depending on certain times. This means that non-interactive

communication tools have to be used for the exchange of information because

they can store the exchanged information, and additionally it can be used later.

2nd tier supplier

1st tier supplier

Customer

Buyer

End User

COMMUNICATION TOOLS

INFORMATION FLOWS

2nd tier supplier

1st tier supplier

Customer

Buyer

End User

COMMUNICATION TOOLS

INFORMATION FLOWS

Figure 11. Location of communication tools in a value net

Also the network structure creates challenges for communication. Usually, a value

net consists of many separate members and mostly the members are also globally

located. The global feature increases requirements for the communication tools

due to the different time zones in the world. For example, when Finnish persons

are working, American citizens are spending their leisure time, and vice versa.

Differences in working hours create thus a problem of information availability

meaning that a universal communication system is needed to share information

regardless of time, and therefore, to enable the fluent and timely management of

business operations.

In addition to the global feature of a value net, there is another factor influencing

on communication. This factor is the increased number of ways to communicate

Page 50: Communication

42

when the network structure is formed. To illustrate this problem, figure 12

describes the change in communication when the form of business relationships

develops from a dyadic partnership to a network structure, such as a value net.

Dyadic partnership Network structure

Two-way communication Multi-way communication

Dyadic partnership Network structure

Two-way communication Multi-way communication

Figure 12. Differences between the ways to communicate in a dyadic partnership

and a network structure

In a dyadic partnership the amount of collaborating, and consequently

communicating parties, is two. Then communication happens in a bilateral way as

figure 12 shows. The situation in the network structure is more complex because

typically a lot of companies have joined the network. For example, figure 12

presents a network which consists of seven separate parties. Merely in this

example the amount of ways to communicate is broad. As the example shows,

there are 22 ways to communicate. A question thus remains: what if there were

much more members in the network?

Table 2 shows how the situation becomes more complicated as more members

join the value net. In the table the amount of members in a value net is limited to

ten parties, but in practice, the amount of members in a typical business network

Page 51: Communication

43

approaches hundreds, or even thousands of different counterparts (Holmalahti,

2001), (Director, 2001b). Therefore, it is significant to consider effective and

efficient ways of communication.

Table 2. The amount of communication ways in a value net

The amount of members in a value net

The amount of alternative ways to communicate

Increase from the previous stage

3 6 - 4 12 6 5 20 8 6 30 10 7 42 12 8 56 14 9 72 16 10 90 18

Based on the table above, a formula can be defined to express the amount of

alternative ways to communicate in a value net. As the definition of a value net

determines, the amount of the members in a value net has to be more than two

parties. In that case the following formula will express the amount of alternative

ways to communicate when the amount of the members is up from three members

and more. The amount of ways to communicate can be calculated as follows: n *

(n-1), when n = the amount of members in a value net.

2.4 Role of the Web-based communication tools in a value net

Asymmetric relationships cause challenges for the use of information technology

in a value net. Small- and medium-sized enterprises - later SMEs - and large

companies have unequal resources for information technology solutions. This

situation causes difficulties in the implementation of a universal communication

system in a value net. Typically, conflicts occur between flexible system and

functionality when the integration of an SME’s systems and a large company’s

systems are considered (Project workshop, 2001). One solution for the system

integration and information transfer can be the utilization of the Internet which is

based on Internet Protocol technology. It is worth noticing that in the simplest

Page 52: Communication

44

way for these IP network solutions is for example the use of Web-based solutions,

for which the user only needs a computer, a connection to the Internet and a

browser. Naturally, the main system behind the user interface has to be competent

(Project workshop, 2001).

New information technologies, for example the Web-based Internet - Extranet -

Intranet, enable fast and timely communication between parties, and thus

accelerate information exchange in the value net. Companies which have already

used value chain management, have gained reduced operating costs, increased

revenue growth and improved customer service levels (Cross, 2000, 36).

However, easy access to complex networks does not only create value, but it also

creates vulnerabilities such as data security problems and dependence on the

digital information (Cartwright, 2000, 32).

In the following chapters both the motives and the vulnerabilities of the Web are

discussed. The last chapter concludes the theoretical part of this study and

describes an ideal situation of the utilization of the Web in a value net.

2.4.1 Motives for the use of the Web

Particularly in the dynamic information and communication technology industry,

many factors are unreliable and unpredictable. Many motives exist also behind the

plans of new information systems and have therefore a positive effect on the

investment decisions. However, it is worth noticing that besides the total expenses

related to the investment, the most important factor in the implementation of a

new information system in business operations is recognizing the benefits that the

new system should forge (Director, 2001a). What comes to the benefits of the

Web, Timmers has listed some positive key features for the Web-aided business

which are worth considering when planning the utilization of the Web (Timmers,

1999, 10-19):

Page 53: Communication

45

1) Available – A Web server is usually online 24 hours per day, 7 days per

week and 52 weeks per year, and virtually immediately accessible -

depending on line speed, network traffic, and other technical issues. This

creates time independence and enables information transfer,

communication, to be decoupled from the local business hours. Thus, time

constraints do not exist, and thus achieved all-day availability is a strong

facilitator of a global presence, overcoming time differences.

2) Ubiquitous – Fixed, mobile, cable, and satellite information networks

enable the global ubiquity. The consequences of ubiquity are: First,

electronic global reach all over the world up to the smallest and in the

remotest corner. Secondly, the changing role of gatekeepers2 causes

changes in business processes, in fact, in the ways of operation. For

example, purchasing will become part of the department of business

development and the specific purchasing department will disappear.

3) Global – The global presence opens new markets at low cost, especially

for small companies that previously could not afford to build up global

efforts – therefore the size of the company matters less. As a counter-

balance to this, there is the fact that companies that previously divided the

local market up from them find themselves confronted with the new

competition in their own backyard. Integration of the Internet with new

forms of application-to-application data exchange is now expected to link

suppliers and their customers globally. With no physical borders for

access, the mental map of what is near and far will change. In fact, the

distance becomes irrelevant.

4) Local – The Internet not only enables global business operations, but it is

also a tool to reinforce local physical presence and local person-to-person

business relationships. The local physical presence can be focused on

improved service rather than on basic provision of purchasing information.

2 A simple example describes well the role of a gatekeeper: A director’s secretary is a gatekeeper

because she filters the necessary contacts away from the unnecessary ones who try to access the

director. In the sector of supply management, the gatekeeper may for example, represent a vendor

manager who limits the amount of qualified suppliers related to the company.

Page 54: Communication

46

For example, the Internet can be used as information and purchasing

resource such that a supplier is better prepared for the physical delivery of

the product or service.

5) Digitization – “The Internet and the communication and computer systems

connected to it are all processing digital and digitized information. Digital

information can be easily stored, transmitted, processed, mixed,

transformed, in short manipulated in many ways, independent of its source

or carrier (Timmers, 1999, 15)”. The main consequences of the digitization

are on the one hand the convergence of communications; information

processing and media, and on the other hand, increasing returns to scale as

the fixed costs are shared among more players while marginal costs do not

increase.

6) Multimedia – The capability to deal with and deliver information in

several ways (text, graphics, sound, video, animations, etc.) enriches the

opportunities for the information provision, and what is of importance, for

the person-to-person interaction.

7) Interactivity – Interactivity is a way of making up for the loss of this type

of personal contact. Contrary to e.g. EDI, which is application-to-

application data exchange, the Internet offers person-to-person and person-

to-application interactivity. (In this study the concept of interactivity is

defined in other way, see Key definitions from chapter 1.6.)

8) One-to-one – Based on data processing and personalized profiling, the

Internet makes supplier and other partner profiling fairly easy by saving

some information about the supplier / partner on the supplier’s / partner’s

computer (e.g. a “cookie”). When the same partner returns to the site, the

information is retrieved and the environment for the personalized dialogue

is ready.

9) Network effects and network externalities – Low cost and fast growth in

the number of relationships enable business models that require a

significant number of parties in the network and whose benefits increase

grow faster than linearly in the number of participants.

Page 55: Communication

47

10) Integration – It has been to some extent demonstrated that the value of

combined information across steps of the value chain is more than the sum

of its parts. The Internet and particularly, the Web with its extensions,

provide at least part of the technology for value-chain functional and

information integration. The single user interface facilitates the transaction

of various business operations. Information integration can be realized

within one company of across companies, in value networks or other

forms of business relationships.

As can be seen, many factors support the utilization of the Web to conduct

business operations. In addition to the list above, one more factor favors its use for

business. This factor is mobility. Mobility is related to the mobile devices that

enable the availability of the person despite his or her geographic location. A

mobile device connected to the company’s data network frees the person to

communicate almost everywhere around the world, and the person is not

dependent on his or her desktop computer, fax, or some other fixed device.

Current mobile devices make possible, for example, to access through secured

remote connection to the company's server and thus receive the latest information

whilst working away from the office, to update mobile workforce, to find useful

travel information, to train and learn on the move or to look for the right word

with a dictionary (Nokia, 2001).

2.4.2 Vulnerabilities in the use of the Web

In addition to the positive features of the Web, there are also a number of negative

characteristics. The main vulnerabilities of the Web are linked to two key issues:

first, the uncertainty related to the security of information available in the Web,

and secondly, the uncertainty of the achievement of the planned economical

benefits from the Web-based systems (Project workshop, 2001). Also problems

relative to trust between partners and international trade barriers are seen as

important disincentives (Timmers, 1999, 9). Timmers lists difficulties in

language, culture, payment and delivery methods linked to the electronic business

Page 56: Communication

48

in global environment to belong to the vulnerabilities of the Internet and its

applications (Timmers, 1999, 14). Additionally, Timmers has captured more of

these vulnerabilities as can be seen in the list below (Timmers, 1999, 8):

1) Lack of awareness and understanding of the opportunities of the Internet

and the Web,

2) Defects in implication and uncertainty about the appropriate business

model for the electronic business,

3) Concerns about total costs, including the costs of retraining the personnel

and the costs related to telecommunications connections and required

equipments,

4) Concerns about security of sensitive data, such as credit-card numbers,

personal data and business confidential data,

5) Concerns about interoperability between separate information systems and

the risk that competition between major suppliers will lead to incompatible

sets of standards,

6) Uncertainty about information property rights, applicable law in universal

business operations and the overall appropriateness of the legal framework

for the electric environment,

7) Lack of usability of the technology, as well as the difficulties in

performing slightly more complicated electronic business than merely

being present with a Web page and information on it.

One more factor can be added to the list above that is the lack of top

management’s commitment. To understand the importance of top management’s

commitment, its content and meaning are defined below. Therefore, the top

management’s commitment consists of several issues:

- Approval of new information systems,

- Allocation of resources,

Page 57: Communication

49

- Supporting gestures for the personnel, for example, the

representative of the top management joins bargaining to help

employees with new supplier or customer,

- Overall understanding of the business,

- Open communication with persons at the same stage and below

(Virolainen, 2001b).

To sum up the main points related to the use of the Web in a value net business

model, a few remarks need to be made. First, the technical solutions have to

function properly. This is very essential because of the supportive role of

information systems in communication among value net members, and also when

transferring a lot of information timely and rapidly. Secondly, no information

system is efficient until the users really can exploit it and the human factors and

leadership issues are emphasized.

2.5 Summary

A value net environment creates challenges for communication between separate

parties. The interactive and non- interactive communication tools are used in

miscellaneous ways and therefore it results many kind of documents, or in some

cases, no documents at all. Therefore, the purpose of this chapter is to present

some theoretical conclusions of how communication tools should be used in a

value net. Additionally, some main points that consider the utilization of the Web-

based communication tools are discussed.

The communication tools are divided into two classes: interactive and non-

interactive tools. Moreover, the Web-based communication tools are separated

from the non- interactive tools. To recapitulate the main typical features of these

two classes of communication tools, a following list has been made:

Page 58: Communication

50

o Interactive tools

??Online communication

??Non-traceable communication

??Enable an iterative decision process

??Direct feedback

??Require personal presence of the counterpart

?? Informal messages

o Non-interactive tools

??Not time-bound communication

??Traceable communication - leave visible documents of the

event of communication

??Require activity from both the sender and the receiver to

get information

??Formal messages

As the list above shows, both types of communication tools have their typical

characteristics. It depends on the case which of the tools is the most suitable one,

but in every case the most important issue is to consider which the requirements

for the information availability are, and what the level of importance of

information to other persons is, or in other words, should other people have access

to that information also.

When discussing the use of communication tools in a value net environment –

whose typical features are, for example collaborative, customer-aligned, digital,

timely and transparent - some issues have to be dealt with: First, information

should be available for everyone who needs it and naturally, who have rights to

access and to handle it. Secondly, information on the paper form should be

converted to electric form which therefore enables easier and faster handling of

information. Nevertheless, these requirements create challenges for the

information management as well as it complicates the determination of

authentication and authorization of the users of information systems.

Page 59: Communication

51

The third significant point to notice is that interactive communication tools should

only be used for issues of minor importance. This is very complex and difficult in

practice because a lot of things are handled during telephone conversations, and

the documentation of these events is troublesome and time-consuming without

additional value for business.

After all, it can be stated that the overall objective of communication tool is

twofold: first, the tool has to help the user to gain and to manage his or her

objectives, and secondly, it has to produce concrete and measurable benefits to its

users. Even if there were many technical and practical factors which favor the

utilization of information technology and thus the use of Web-based

communication, some additional focus must also be on the change management,

so that the users were motivated and they had a reason to use the new

communication tool. Therefore it is important that the idea of the new tool is

clarified to every single user, and its use is controlled and followed continuously.

This is the way that a company can achieve increased competitive advantage with

the help of the new communication tool (Project workshop, 2001).

What comes to the utilization of the Web in a value net, figure 13 illustrates an

ideal situation of the Web-based communication in a value net. Internet-based

applications, which in this study are Web pages, are used for the whole value net,

as the Web-based Extranets are seen as more restricted applications directed to the

separate interest groups. The Web-based Intranets, in turn, are developed for

internal company use only.

Page 60: Communication

52

2nd tier supplier

1st tier supplier

Customer

Buyer

End User

COMMUNICATION TOOLS

INFORMATION FLOWS

the Internet

Extranet

Intranet

2nd tier supplier

1st tier supplier

Customer

Buyer

End User

COMMUNICATION TOOLS

INFORMATION FLOWS

2nd tier supplier

1st tier supplier

Customer

Buyer

End User

COMMUNICATION TOOLS

INFORMATION FLOWS

the Internet

Extranet

Intranet

Figure 13. Ideal model of the Web-based communication in a value net

As can be stated, the Web offers many possibilities as well as challenges to the

value net. In the value net the main benefits are related to the time-regardless

availability of information that also is not depending on the location of a company

or an individual person who needs to get access to information.

In the following chapters the current state of communication is examined in the

case companies. What comes to the communication tools studied in the empirical

part of this thesis, table 3 presents the mediums which are included to the

research. As can be seen, there are twice as more non-interactive tools as

interactive ones. This is due to the emphasis on the Internet-based communication

tools, and particularly the Web-based ones.

Page 61: Communication

53

Table 3. Classification of the communication tools studied in this thesis

Interactive Non-interactive Fixed phone Beeper Cellular phone SMS Communicator or other comparable device

Fax

Videoconferencing Mobile device Face-to-face –contact E-mail FTP The Internet (Web-based) The Intranet (Web-based) The Extranet (Web-based) Electronic bulletin board Electronic conversation

channel Post, mailings

Page 62: Communication

54

3 USE OF COMMUNICATION TOOLS IN THE CASE

ENVIRONMENT

The study of the use of communication tools in the case environment was

expanded as follows: First the ICT industry and its characteristics are briefly

presented. Then there are short descriptions of each case value net which give an

overview of the case companies. After that the discussion moves on to the Web

survey which includes subjects related to the implementation of the survey and the

analysis of the results. Finally, a short summary of the results is presented.

3.1 Presentation of the information and communication technology

industry and the cases

Fundamental structural changes owing to the convergence of information and

communications technologies and services have modified the telecommunications

environment. These changes have contributed to renaming the environment to the

information and communications technology (ICT) cluster (Paija et al., 2001, 11).

Paija (2001) has studied the formation of the ICT cluster and therefore defined

clusters to be networks of organizations, in which competitive advantage grows

from dynamic interaction between actors. Relationships in the ICT cluster pass the

boundaries of separate sectors, and advance innovation and upgrading through

spillovers and knowledge transfers.

Page 63: Communication

55

Figure 14. ICT cluster framework

(Source: Paija et al., 2001, 15)

The ICT cluster consists of different categories of sectors as it can be seen in

figure 14. In the core of the ICT cluster, there are the key industries which

manufacture information and communication equipment and networks, and

provide network services. Around the key industries are those industries that are

considered to contain special potential in enhancing the competitive advantage of

the system through innovative applications of the ICT, or though improving its

functional preconditions (Paija et al., 2001, 15). The supporting industries supply

the key industries with specialty inputs and manufacturing services. These are

mainly provided by, for example the electronics industry. Associated services, in

turn, enhance the functional premises of the cluster firms. These services are

provided, for example, the financial sector, regulatory bodies and universities and

other units of the national knowledge infrastructure. Related industries represent

for example media, news agency and entertainment services which complement

Page 64: Communication

56

the key products and further their demand. Finally, individuals and organizations

form a groups of Buyers and Appliers of the ICT products and services that have

an important role in advancing manufacturers in innovation and quality

improvement (Ali-Jyrkkö et al., 2000, 21-22). In many contexts can be stated that

many of the related industries have a dual role: first, as providers of value-added

content to the infrastructure, and second, as buyers/appliers of ICT (Paija et al.,

2001, 16).

3.1.1 Typical features of the ICT industry

Some characteristic of the ICT cluster has to be stressed to understand the

importance of effective and efficient communication in a value net, and particularly,

in the sector of information and communication technology. Elfvengren et al. have

listed several features typical for the telecommunication industry. In addition to the

features suitable also for other industry sectors, the typical features of

telecommunication sector include changing earning logics; convergence of

networks, terminals and services; turbulence; shortening lifecycles and time-to-

market, to mention a few (Elfvengren et al., 2001). Besides these factors the

development of digital data and information has a major role in the ICT sector:

Digitalization of content, provided by related industries, is seen as the most

prominent factor in augmenting the forthcoming demand for data and information

network infrastructures (Paija, 2000, 2).

Particularly, the decreased amount of time available for the product development

and the launching of the product creates challenges and difficulties for the suppliers

in the ICT industry. To meet the objectives of the buyer (the head company), the

supplier should have at least two-years forecasts of the economic trends, as the

investment process at the minimum requires one and half year (Director, 2001a).

An ICT company can be seen as a multi- industry player due to its manifold

spectrum of the products and services it offers. In fact, the products may vary

from the construction of network infrastructure to the providing of services for

Page 65: Communication

57

consumers’ mobile phones. Therefore, the ICT company needs partners and other

suppliers to implement various solutions because its core competence is to be, for

example a telecom operator, as opposed to a software developer or a manufacturer

of cable.

For example, when considering the construction of a cable network, the ICT

company needs a cable supplier to produce the raw material, which in this

example is cable. The cable supplier typically represents the traditional type of

company from process indus try. In this example it is important to notice that the

ICT company expands the capacity of the network due to the increased demand in

the capacity of the data or telephone connections. Indeed, the increased demand of

the network capacity could be due to, for example, the new applications which the

consumers have adopted, or the discounts in connection prices. The cable supplier

may have known about the increase in cable demand, but due to the nature of the

process industry, the adaptation to the increased demand may not be quick. The

managers in the process industry needs to decide, for example, whether to invest

on a new production machine or to build an entire new factory. Usually, the raise

of the capacity in a factory spends at minimum one and half year (Director,

2001a).

Contrary to the process industry, the changes in the ICT industry happen more

frequently, and the process industry follows afterwards. Although the previous

example considered the process industry, there are also other industries that have

to adapt to the turbulent changes in the ICT sector such as component

manufacturing or even textile industry that produces working clothes for the

constructors of the networks. Therefore can be stated that the bigger the

investments required in the supply side, the slower the adaptation to the increased

demand, and simultaneously the bigger the discrepancy between buying and

supplying companies from different industry sectors. Thus, early reactions for the

changes and against the bullwhip effect on the upstream companies require

efficient and effective communication in the value net.

Page 66: Communication

58

Figure 15 describes the adoption life cycle of a new technology. Usually, the

figure is related to the marketing discussions because it illustrates the curve of a

product lifecycle: Early markets describe the situation when customers are

innovators and technology enthusiast; The Chasm illustrates the phase of vast

despair; and The Bowling Alley is a period of niche-based adoption in advance of

the general marketplace. While The Tornado describes the phase of mass-market

adoption continuing up to a period of Main Street, the last phase illustrates

diminishing demand curve that ends the life of the product (Moore, 1995, 14-25).

Life cycle of a new communication technology

Adaptation to the increased demand in process industry starts (investment decisions etc.)

Investments in process industry are complete

Life cycle of a new communication technology

Adaptation to the increased demand in process industry starts (investment decisions etc.)

Investments in process industry are complete

Figure 15. Discrepancies between the ICT and the process industry

(Modified from Moore, 1995, 25)

However, in the context of this study, figure 15 can be used to describe the

discrepancy between the ICT industry and other industry sectors. Figure 15 itself

illustrates the ICT company and the life cycle of its product. In this example the

product is considered as a new communication technology. The additional lines in

Page 67: Communication

59

the figure describe the distinction between the ICT and exemplarily the process

industry that occurs when the suppliers are not able to adapt to the situation as fast

as the buyer company does.

3.1.2 Buyer A and its case value net

Buyer A is a large company operating in mobile communications with functions

in several countries. Therefore, Buyer A can be defined as a communication

company belonging to the key industries of the ICT cluster. By combining its

knowledge in mobile communications, the Internet and service provision, Buyer

A is a global telecom operator and provider of transaction and content services.

Through its network access business, Buyer A offers voice and data services to

consumers as well as corporate customers in Finland and nearby areas.

Buyer A’s case network consists of eight suppliers, so that four of these suppliers

are the 1st tier suppliers and the rest four are 2nd tier suppliers. The natures of these

suppliers vary, and they can be described as follows:

- Cable 1: According to the definition of ICT cluster, this company includes

to the supporting industries as manufacturers cable for network

infrastructures. (Large company, status in this study is the 1st tier supplier)

- Cable 2: This company allocates raw material to the cable manufacturers;

thus, it includes to the supporting industries. (Large company, 2nd tier

supplier)

- Software 1: This company includes to the supporting industries because

develops software for invoicing and the management of the

telecommunication networks. (Large company, 1st tier supplier)

- Software 2: This supplier is an internal division of the company Software

1, and thus includes to supporting industries. (Large company, 2nd tier

supplier)

Page 68: Communication

60

- Component 1: As this company supplies components to the

communication networks, it belongs to the supporting industries. (SME, 1st

tier supplier)

- Component 2: The firm is a representative of supporting industries due to

the manufacturing of components to the communication networks. (SME,

2nd tier supplier)

- Textile 1: As a contract manufacturer of textiles for the builders of the

networks this firm is classifies as supporting industries. (SME, 1st tier

supplier)

- Textile 2: This supplier produces raw material for the company Textile 1

and includes also to the supporting industry. (SME, 1st tier supplier)

The location of every case company can be seen in figure 16.

Buyer A

Cable 2

Cable 1

Software 2

Software 1 Component 1

Component 2

Textile 1

Textile 2

Buyer A

Cable 2

Cable 1

Software 2

Software 1 Component 1

Component 2

Component 1

Component 2

Textile 1

Textile 2

Textile 1

Textile 2

Figure 16. Buyer A's value net in this study

3.1.3 Buyer B’s and its case value net

Buyer B is a provider of mobile, broadband and IP network infrastructure

including related services. Buyer B is a representative of the key industries. The

company has operations in many countries worldwide and it is classified as a large

company. Buyer B can be classified as a telecom company.

Page 69: Communication

61

Buyer B’s case network consists of three suppliers, so that each of these

companies form a separate tier in the Buyer B’s supply chain. These suppliers can

be presented in the following way:

- Equipment 1: This supplier assembles components to the communications

networks and belongs to the supporting industries. (SME, status in this

study is 1st tier supplier)

- Equipment 2: As a manufacturer of components to the communications

networks also this supplier belongs to the supporting industries. (SME, 2nd

tier supplier)

- Equipment 3: In addition to the above-presented suppliers, this company is

a 3rd tier supplier and it manufacturers components to the

telecommunications networks. It also represents the supporting industries.

(Large company, 3rd tier supplier)

The location of these case companies can be seen in figure 17 below.

Buyer B

Equipment 2

Equipment 1

Equipment 3

Buyer B

Equipment 2

Equipment 1

Equipment 3

Figure 17. Buyer B's value net in this study

Page 70: Communication

62

3.2 Implementation of the Web survey

The implementation of the questionnaire survey included several phases until the

final Web survey was ready. In the following chapters the research frame, and the

proceeding of the compilation of the questionnaire is described, as well as the

related challenges that occurred during the different phases of the survey.

Additionally, some of the details linked to the utilization of the Web as a survey

tool and the time schedule are described in this chapter. The questionnaire form is

attached as appendix II in the end of this thesis.

This Web survey had two objectives. First, the questions were composed to

measure the current state of the case companies. The questions were divided into

three separate divisions due to the different scope of every researcher among the

project. What comes to the objective of the survey related to this thesis, the

purpose of the questions were to measure the current state of internal

communication in the case companies. Although the research area of this thesis is

linked to the concept of a value net, and additionally on that basis also onto inter-

firm relationships, it was found important to clarify the intra-organizational

situation which, in fact, creates the base for the external communication with the

other members of the value net. That is the reason why inter-organizational

communication is excluded from this thesis, and the focus in on internal

communication in different levels – Buyer, and 1st tier, 2nd and 3rd suppliers - of a

value net.

According to the name of the project “Information Technology in Business

Relationships” the second aim of the survey was to test how the Internet, and

particularly the Web, can be utilized to the collection of data. To meet the second

objective, the advantages of the Internet - low cost of the fieldwork, potentially

quick responses and turn-around times and the possibility of very large sample

sizes (Ramsay, 1998, 83) - were examined to get feedback from the use of the

Internet as a data collection tool. In fact, the easiest way to implement the

questionnaire survey would have been the mailed questionnaire in a paper form,

Page 71: Communication

63

but due to the purpose of this study and this project, the Web survey was an

obvious selection to the survey tool. Also the statements related to the advantages

of a Web survey supported the implementation of a Web questionnaire.

However, it was known that the procedures for managing a Web-based survey

may differ from those used by telephone, mail and face-to-face surveys, and it is

possible that response rates and speed of response may differ as well (Ramsay,

1998, 83; Heikkilä, 1998, 68).

Benefits of the Web survey were mentioned not only the lower costs of access to

the respondents - the Internet version excluded all the printing costs of

questionnaires and covering letters, postages; additionally, it saved a lot of time to

make the survey available to the respondents - and easiness and quickness of the

implementation of the survey, but the ability of data collection from respondents

all over the world. The Internet allows the delivery of the survey at the same cost

and at the same time to everywhere without delay of the mail delivery to the

respondent and sending by return. (Couper, 2000, 464-465) Besides these facts,

the formation of the response data can continuously be followed during the

survey. What comes to the practice, the above-mentioned statements about the

costs agreed closely with the facts related to the implementation of this survey

because after all the overall costs of this Web survey consisted of the license of

the statistical software and the time usage of the researchers.

3.2.1 Research frame

Due to the objective of the survey to collect descriptive data for the case study

research, the sampling of the survey was done as judgment sampling. Judgment

sampling concentrates on studying of the case companies, and therefore the

sample is based on named respondents, as opposed to random sampling. In the

context of this study, the judgment sampling was implemented to get information

about the current use of communication tools in the case companies, and therefore

the results are not, and in fact, they cannot be generalized either to other

Page 72: Communication

64

companies or to other industries. If the results would like to have been

generalized, the sampling should have been done as random sampling from the

entire supplier networks of Buyer A and Buyer B (Puumalainen, 2001).

In other words, the aim of this descriptive study was just to encapsulate the data of

the current state into numeric form and therefore made descriptive figures and

tables to describe the topic at hand. The nature of this study is thus quantitative

due to the questionnaire survey and the basic statistical tests, but the lack of

further statistical implications and therefore generalizations ignore the statistically

significant conclusions.

The most essential point in this survey was to achieve reliable, accurate, and right

information about the subject of the research. Particularly in this thesis, the

essential information concerned issues related to the availability and the use of

communication tools in the companies of two case value nets. Due to the lack of

statistical implications related to judgment sampling, reliability was tried to

achieve by selecting the essential and right persons to key informants. In fact, the

highest possible reliability was tried to approach by having personal contacts with

the main representatives from the case companies, and then the proceeding and

the objective of the Web survey was explained to them in details. Additionally,

special attention was stressed that how important it was to name the right persons

as respondents, and thus enable the achievement of reliable and right information

from the survey.

The target group of this survey consisted of Buyer A and Buyer B which are the

heading case companies in the project. Besides these companies, also some of

Buyer A’s 1st tier and 2nd tier suppliers and some of Buyer B’s 1st tier up to the 3rd

tier suppliers were included into the target group. As a whole, the size of the target

group was 13 companies. The sample itself was formed according to the certain

criteria: every respondent must be linked to the other case companies in the

project. For example, Buyer A’s respondents had to have a connection to some of

their 1st or 2nd tier suppliers which also participate in this project. Respondents

Page 73: Communication

65

from Buyer B had also to have something to do with their named suppliers.

Additionally, the suppliers had to have connections to the other companies both to

the upstream and the downstream of the chain.

The value net of Case A was based on representatives from Buyer A’s separate

sourcing categories. In fact, four of the seven possible sourcing categories were

linked to the survey. Eight companies from these four categories were included:

two companies from the cable industry, as well as two from the software, textile,

and component industry. Buyer B’s value net was related to the Buyer B’s main

product and the case suppliers were selected accordingly.

After the case companies were named, the remaining task was to search for key

informants for the survey. The key informants were persons who represented all

the employees of the company in a broad way. For this survey the selection of

these persons was quite clear because there were only a few persons per case

company who fulfilled the selection criteria. The selection criteria defined that the

key informants must have a connection to other case companies in the determined

case value net. Furthermore, the selection of the key informants was based on the

beforehand made definition of the relevant functions which were planned to

include in the sample.

Page 74: Communication

66

Buyer B

Element 2

Element 1

Element 3

Buyer A

Cable 2

Cable 1

Software 2

Software 1 Component 1

Component 2

Textile 1

Textile 2

Buyer B

Element 2

Element 1

Element 3

Buyer B

Element 2

Element 1

Element 3

Buyer A

Cable 2

Cable 1

Software 2

Software 1 Component 1

Component 2

Textile 1

Textile 2

Buyer A

Cable 2

Cable 1

Software 2

Software 1 Component 1

Component 2

Component 1

Component 2

Textile 1

Textile 2

Textile 1

Textile 2

Figure 18. Limitation of the target group of the Web survey

Nevertheless, some difficulties occurred during the collection of the judgment

sample for this survey. The overall objective of the sample size was defined to

consist of 416 (13 companies * 8 divisions * 4 persons) respondents. The sample

was planned to consist of 13 companies in which eight different divisions were

named - financial administration, purchasing / supply management, sales /

marketing, production, data administration, research & development, general

management and logistics. From each of these eight divisions 4 respondents were

tried to reach, but it was not possible due to the limitation of the research area.

Within the limits of the project, some of the relationships were dropped out of the

sample and thus cause the complicated situation related to the sample.

Figure 18 describes the problematic situation of the sampling: The arrows

illustrate relationships within the limitation of the project related to the case

companies, and the crosses figure the outlined relationships. Naturally, the case

companies also have outside-remaining relationships, but they are excluded from

the survey because they do not include to the scope of this study. Due to this fact,

Page 75: Communication

67

Buyer A and its 2nd tier suppliers, which are the undermost companies in the

picture of Buyer A’s value net, do not have all of the required respondents. The

same fact can be found in the Buyer B’s value net, as Buyer B and its 3rd tier

supplier are missing some of the divisions expected to include in the sample. The

dotted lines in figure 18 describe relationships that remain outside the sample.

The final sample of the Web survey consisted of 168 respondents. The

distribution of the respondents between the case companies can be seen in table 4.

Table 4. Sample of the Web survey

The name of the company The number of the respondents

The status of the company in the case value net

Buyer A 29 Buyer Buyer B 18 Buyer Cable 1 22 1st tier supplier Cable 2 1 2nd tier supplier Component 1 15 1st tier supplier Component 2 7 2nd tier supplier Element 1 8 1st tier supplier Element 2 16 2nd tier supplier Element 3 13 3rd tier supplier Software 1 12 1st tier supplier Software 2 5 2nd tier supplier Textile 1 20 1st tier supplier Textile 2 6 2nd tier supplier TOTAL 168

As can be seen, the number of the respondents is quite irregularly distributed. Due

to the descriptive objective of this study, irregularity does not cause significant

barriers to the implementation of the survey.

3.2.2 Compilation of the questionnaire

The research group of the Web survey included three project researchers and

some external researchers and assistants.3 The project researchers started

3 Huhtinen, Heli; Ojala, Tiina, and Vahtera, Hannu (project researchers), and Puumalainen, Kaisu

(external researcher of the project) and Taalikka, Sanna (external research assistant of the project)

Page 76: Communication

68

compilation of the questions in March 2001 when the questionnaire was divided

into three different categories based on the scope of every researcher in the

project. One of the researchers composed queries related to communication tools,

and the other researcher made questions related to knowledge management in a

value net. The third researcher compiled questions that were linked to information

systems.

The compilation of the questions started by drafting issues at the topics. When the

first drafts were ready, the research group met a few times to refine the questions,

and during the final meeting the group decided one by one which questions

remain to the final questionnaire. After the elimination phase there were 15

questions left, and the programming of the Web form was able to start.

The Web questionnaire was made with SPSS Data Entry Builder. Other software

for data collection was also available, for example, Survissimo (2001) and

QuestNet (2000), but SPSS Data Entry Builder (1996-2000a) was chosen first,

due to its direct suitability to the statistical software SPSS for Windows (SPSS,

1996-2000b) and secondly, due to its reputation as a scalable “Drag and drop” –

tool for creation of the Web survey.

The assemblage of the questionnaire furthered as follows: First, the objects were

drawn to the form. Then these objects were completed with setting the right

variable properties to each of them and after that the questions were created. After

building the questions, revising the properties, and ascertaining each of the

variables, the questionnaire was exported to the html-format to the network server.

A few difficulties occurred during the export phase but after the software had been

reinstalled, the export of the Web form was managed to implement without further

problems.

The Web form was pre-tested using various browsers and operating systems

inside the university’s local area network, as well as outside the campus area.

Additionally, a few test respondents also answered to the questions and gave their

Page 77: Communication

69

comments on it. Based on the comments and findings during the test period, the

Web survey was once revised before the final version. There were two main

changes which had to be made to improve the Web form, and thus to make the

form more comfortable to answer. The first change was to decrease the number of

the questions from fifteen to twelve, and the second change was to insert a

comment field at the end of the questionnaire. The free comment field allowed the

respondents to express his or her opinions to the research group as well as to

inform about possible problems occurred in the form. Valuable information could

therefore be received also from that field.

3.2.3 Challenges related to the implementation of the Web survey

Several challenges occurred during the implementation of the Web survey. The

main concerns were linked to the phrasing of the questions, information flows

between the members of the research group, technical issues, and the overall use

of the Web instead of the paper questionnaire. Additionally, some difficulties

were met when contacting with the main representatives of the case companies

during the sample collection. What comes to the previous experiences of the

challenges related to the Web surveys, some other studies have revealed that the

main challenges of a Web survey are linked to the capturing of the motivation of

the respondents, technical problems, confidentiality concerns, and low response

rates compared to mail surveys. (Couper, 2000, 464-470)

The phrasing of the questions was complicated due to the complex research

arrangement of two value nets. Therefore, the research group decided to use one

general questionnaire form to collect the data from every respondent because

another alternative was to compile thirteen different forms, individually for each

case company. For technical reasons, the general form was selected because

thirteen individual questionnaires would have required as many individual forms,

and thus also individual Web addresses, as there were different and modified

forms. Therefore, the research group decided that one universal Web address is on

one hand enough due to the easiness of the update of the form, and on the other

Page 78: Communication

70

hand, to avoid confusion between separate forms. The respondents were informed

about their situation related to the survey with customized covering letters. As can

be seen from the covering letter, the respondents were presented an example of

how they were expected to answer to the questions. An example of the covering

letters is attached as appendix IV in the end of this thesis.

To examine the relationships between the members of a value net requires as

many aspects as there are members in the value net. In the value net the location

of the company affects that how the respondent concerned answers, and from

which point of view he or she looks the entire value net. For example, in these

case value nets some of the companies are the 1st tier suppliers and they consider

other companies as buyers or their 1st tier suppliers. In some other value net the

same company can be situated as a buyer who has the same companies as its own

1st and 2nd tier suppliers. Consequently, it is very important to recognize that the

aspect and location of every case company is correct in the value net, and that the

respondents understand right their location related to the case value net.

Flow of information between the researchers was the third challenge during the

compilation of the questions. Due to the distinct geographical locations of the

researchers, face-to-face meetings were arranged quite rarely and conversations

about the modifications were made by phone. Therefore the comprehensive

modifications were quite complex to implement because the relevant researcher

was not available online during the formation of the questionnaire. Probably, the

compilation of the questions might have taken a shorter period of time if the

project researchers have met more frequently in face-to-face contacts.

However, technical problems arose above of all challenges. These problems could

be divided into two separate parts: First, problems linked to the SPSS Data Entry

software, and secondly, problems linked to the use of the Web. What comes to the

first problem, the SPSS Data Entry software is a quite new tool for implementing

a Web survey. For example, in the Lappeenranta University of Technology only a

couple of surveys have previously been made with this tool, and the level of

Page 79: Communication

71

expertise related to the use of the software is thus quite low. Despite the fact,

learning to use this tool was quite easy due to the researcher’s previous use of

different software tools. Without the basic knowledge of the html- language and its

behavior in a browser, the compilation of the survey would have been more

difficult to implement.

Problems linked to the use of the Web occurred during the export phase. When the

draft versions of the survey were exported to the html-format, the rows and

columns did not appear as they did in the design view. Some of the text boxes

were also overlapped. In addition to those difficulties, the software did not create

the required folders to the network server that hindered the answering to the

questionnaire. These problems were not known before but after a few

experimental changes the form operated properly. The solution was to reinstall the

software by allowing full administrator privileges to the user at the moment of re-

installation of the software. After the re-installation the application began to

operate properly, and the network server was able to receive the Web form.

The use of the Web required modifications onto the form because of the spectrum

of different browser software used in the case companies. The problem of browser

compatibility is recognized also in other Web surveys (Couper, 2000, 490).

Related to this study, the main challenge was to make a suitable form for certain,

widely known browsers. The form was designed to suit for different versions of

Microsoft Internet Explorer and Netscape Navigator. Occasionally, the browser of

Opera was also found to be one of potential software allowing the answering to

this survey. Despite accurate design of the layout, various versions of these above-

mentioned browsers caused problems because the layout varied a lot depending on

the used browser version. The solution to this was to leave large empty space

between separate questions and to limit the width of the Web form as narrow as

possible. The layout itself and the size of the objects required recognizing of the

variance in size of the respondent’s screen, the speed of data transfer, and also the

speed of the processor in the respondent’s computer.

Page 80: Communication

72

The characteristics of the Web became apparent when planning the way of how

the respondents were contacted. For example, the format of the covering letter had

to be adaptable to any environment, so that the letter would be opened up with any

computer. After considering separate alternatives, such as Word document or an

html-based document, the portable document format, PDF, was chosen due to its

anti-virus characteristics and its nature of free software for reading the PDF

documents.

Another challenge was to consider how the respondents were motivated to answer

to the survey. It became apparent that an e-mail message with an attached

covering letter was quite easy to skip and forget; almost in case of busy

respondents who receive many e-mail messages during one working day. This fact

has also been recognized in other studies, as the response rate remains low due to

the disappearance of the e-mail messages (Couper, 2000, 473).

The research group considered the possible use of some incentives to achieve a

better response rate. In traditional mail survey a common practice is to use some

kind of incentive to encourage people to respond (Ramsay, 1998, 83-92). The

incentives can vary, for example, from prize draws and tickets for a free cup of

coffee to the price reductions in certain stores (Ramsay, 1998, 83-92). However,

the idea of an incentive was remained without implementation because the

suitable type of the incentive was difficult to decide. As the sample consisted of

representatives of the case companies which were volunteered to participate in the

project, the key informants – the respondents - had their duties to answer to the

questions. As a result the research group concluded that the overall end results

would be the appropriate incentive to the respondents. Additionally, the

respondents had thus a good possibility to get information about the current state

of their companies with issues related to the combination of the use of the Web

and business operations.

Page 81: Communication

73

3.2.4 Time schedule of the Web survey

The Web survey was implemented according to a planned time schedule. The time

schedule was strict because the phase of implementation started in the beginning

of March, and the data had to be collected already in the middle of June. As a

whole, the scheduling went fine and large problems were managed to avoid.

Figure 19 shows the proceeding of the Web survey in weeks.

Research ScheduleMonth March April May June JulyWeek 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28

Ideas of what to askFormulation of questionsInternet Questionnaire designTechnical preparing Cover letter designPretesting the questionnaireCollecting the sampleFinishing the questionnaireMailing arrangementsPrenotificationsMailingResponse timeMailing the reminderCoding the responses (if needed)Preparing the data fileOverall review for companiesAnalysing the data for the thesisWriting the report

Figure 19. Proceeding of the Web survey

As can be seen from figure 19, the process of implementing a Web survey with

three separate researchers took altogether almost five months. The formulation of

suitable questions and the creation of the form, which is named as Internet

Questionnaire Design in the figure, were the longest phases during the survey.

Despite of this a little bit longer period, the Web survey proceeded fluently and

the time schedule needed no changes.

Page 82: Communication

74

As a whole, the implementation process required one full-time researcher’s job

during one and half month. This phase consisted mainly of the formulation of the

questionnaire and technical testing. During the other remaining time the

researcher was able to do complementary research such as reviewing of literature

or writing the report.

3.3 Results

A total of 168 mails were sent to the beforehand-named respondents for

answering to the Web survey. From these respondents 96 answers were returned.

After data checking, the amount of acceptably filled questionnaires was 84. The

main reason for the decreased amount of the acceptable answers was the

elimination of duplicated answers which were due to fact that the Web server had

received the data from the same form twice or more. Therefore the response rate

was confirmed as 50 per cent, which was very satisfactory compared to the

response rates of other similar Web surveys (Kardaras & Papathanassiou, 2000,

287; Teo & Tan, 1998, 340).

On one hand, the factors affecting the good response rate might have been

personal interest and encouragement of the respondents which resulted from the

fact that in the case companies the contact persons had beforehand been informed

and had agreed to participate in this study. These contact persons, in turn, had told

the respondents to answer to the questionnaire. On the other hand, one motivating

factor might have been the presence of a large company as a principal of the

survey. The small- and medium-sized companies probably respect the large

companies and thus they are eager to participate in the projects of the large

companies.

The response rate might have even been higher if the survey would have been

made both in the forms for the Web and the paper. In that case the respondents

would have had the possibility to choose the form they preferred, and thus the

response rate might have increased more. One decreasing factor may have been

Page 83: Communication

75

the use of the Internet as the main information channel. Some of the respondents

did not have the access to the Web and a paper form was sent to them.

Additionally, some of the respondents may have an anti-Internet attitude, or they

have been busy and thus ignored the survey. However, due to the empirical

research problem related to the utilization of the Web in this thesis, the survey was

consciously made only for the Web form.

Differences in response rates existed between Cases A and B. It is worth noticing

that the respondents from Case B were more eager to answer than the respondents

from Case A. Reasons for the difference may have been the distinction between

the sizes of the value nets, as case A included nine firms opposite to four firms of

Case B. Therefore in case A, three lower levels of the response rates of the

companies have had such a significant influence on the overall response rate of

the entire case value net. Additionally, even the head company Buyer B achieved

a better response rate than Buyer A did. Reasons for this may be based on

differences in personal preferences or business cultures. Additionally, the

respondents may have had various opinions about the importance of this survey.

Above-mentioned reasons may have affected that also the companies in the supply

side answered more frequently than the buyer companies did.

Table 5 shows the difference in response rates between the case value nets. As can

be seen, Buyer A, Cable 1 and Component 2 had the lowest levels of the response

rates per company. On the other hand, the highest proportions are found in

connection with Cable 2 and Textile 2. Nevertheless, these companies had a quite

small sample and it might have had a positive influence on the ir response rates.

Page 84: Communication

76

Table 5. Differences in the response rates between the case value nets

The name of the company

Case A or Case B

The number of the respondents

The number of acceptable responses

Response rate per company

Buyer A A 29 7 24,1 % Cable 1 A 22 6 27,2 % Cable 2 A 1 1 100,0 % Component 1 A 15 7 46,7 % Component 2 A 7 2 28,6 % Software 1 A 12 9 75,0 % Software 2 A 5 3 60,0 % Textile 1 A 20 11 55,0 % Textile 2 A 6 6 100,0 % Buyer B B 18 8 44,4 % Equipment 1 B 8 6 75,0 % Equipment 2 B 16 11 68,8 % Equipment 3 B 13 7 53,8 % TOTAL 168

Case A: 113 Case B: 55

N = 84 Case A: N= 52 Case B: N= 32

Overall: 50,0 % Case A: 46,0 % Case B: 58,2 %

The following chapters describe the results related to the research problems of this

thesis that are the questions related to the availability and the use of

communication tools that are questions 1 and 2. Results concerning the question 3

and the other parts of the survey, such as “Information systems” (questions 4, 5, 6,

7, 8, 9 and 10) and “Information management” (questions 11 and 12), are

discussed in other reports of the project “Information Technology in Business

Relationships”.

The structure of the following chapters is divided into two separate parts

according to Case A and Case B. First, each of the chapters is based on the

description of the availability of communication tools in the case value net. The

investigation of the current availability of communication tools is of importance

because it forms the base for the further improvements of communication. Then

the study furthers to the report of the use of communication tools concentrating on

the use that happens internally in the companies in different levels of the value

nets.

Page 85: Communication

77

The report of the use advances in the following way: First the distribution of the

use of the interactive and non-interactive communication tools is considered as

well as the proportion of the Web-based tools among the non- interactive tools.

Findings from these results give an overall review of the nature of communication

in the case value nets. Secondly, a closer look is taken to the Web-based tools

which are regarded as the Internet, Intranet and Extranet applications. The

proportion of the Web-based tools is linked to their possibilities in a value net,

and these results review the current state of the use of the Web-based

communication tools in the case value nets. Thirdly and finally, the use of the

most utilized communication tools is described based on the results from the

survey. After the result presentations from the cases, the summary phase captures

the main findings and differences between these two case studies.

3.3.1 Case A

Availability of communication tools

Before the use of communication tools can be presented, the availability of

communication tools have to be described. In the survey the respondents were

asked to mark the communication tools they used or they did not use but they had

the tool with them. The markings were rated as number 1 if they chose the tool,

and if they ignored it, the marking was 0. Thus, these results are only descriptive

when considering the availability of the communication tools. Additional point to

notice is that face-to-face contact is left away from the examination of the

availability due to its self-evident presence with each of the respondents.

Figure 20 shows the availability of communication tools in Case A. The bars are

based on the number of 52 respondents (N=52). As can be seen, the most typical

communication tools seem to be fixed phone in addition to fax, e-mail, Internet

pages, and post. These five tools approach the availability rate of 100 per cent

meaning that almost every one of the respondents had that communication tool.

Page 86: Communication

78

However, it has to be noticed that the proportion of the availability of Extranets is

quite low.

Case Buyer A

PostElectr. conversation

Electronic bulletin

Extranet

IntranetInternet

Communicator

E-mailMobile device

FaxSMSBeeper

Videoconferencing

Cellular phone

Fixed phone

%

100

80

60

40

20

0

Figure 20. Availability of communication tools - Case A

The difficulty in interpreting the data is probably a consequence of weaknesses in

the experimental design (see question 1 in appendix II). The respondents may

have had problems and misunderstandings when considering the markings related

to Internet, Intranet and Extranet. In the form these applications were only

mentioned by their names, and no further information was given. Therefore, the

possibility of uncertain answers is prevailing.

However, the interpretations from the data reveal that the availability of

communication tools is good in overall. When considering the value net and its

characteristics linked to the use of the Web-based tools, the shortage of Intranets

and particularly Extranets might require some investments on them to improve the

level of Web-based communication.

Page 87: Communication

79

The use of communication tools in the case companies

The presentation of the use of communication tools starts with describing the

distribution of the means of the interactive, the non- interactive and the Web-based

tools. The interactive tools enable online and thus real-time informal

communication as the non- interactive tools are for the formal and time-

independent communication. Web-based tools, in turn, are reviewed as an

independent group due to their similar basis on the Internet and IP technology.

Table 6. Use of the interactive, non- interactive and Web-based communication

tools in own company - Case A

Company’s status Interactive tools Non-interactive tools

Web-based tools

Buyer A 3,71 **) 2,28 2,90 1st tier suppliers 3,68 2,30 2,64 2nd tier suppliers 3,44 2,16 2,45 TOTAL *) 3,63 2,27 2,64 *) The total means may vary from the individual means with buyer and supplier due to the rounding **) 5 = Uses very much, 4 = much, 3 = sometimes, 2 = rarely, 1 = not at all

As can be seen from the total means in table 6, interactive tools are the most used

ones when communicating inside own company. Statistically significant

differences do not occur among the different tiers - Buyer A, 1st tier or 2nd tier

suppliers - in Case A, and neither in any of the three classes of communication

tools studied in table 6 above 4.

However, it is worth noticing that the Web-based communication tools are used

more than which can be seen by the total average related to the group of the non-

interactive tools. Additionally, the means reveal that the communication in own

company happens most frequent ly with the interactive communication tools. As

the rate of 4 illustrates using the tool “much” and 3 illustrates using “sometimes”,

the average of closely 4 illustrates the level of regular interactive use.

4 See one-way anova tests in appendix III

Page 88: Communication

80

In this context it is significant to remember that the use of the interactive tools do

not leave any tracks – documents - linked to communication if they are not

separately compiled. The availability of information for other, outside-of-the-

discussion, persons depends on the tracks based on the event of communication,

and in the case of important interactive communication it might be beneficial to

consider some kind of documentation of communication at hand. The non-

interactive communication tools enable the traceable communication and it would

be worth considering their use for tracking of the documents.

Total means in table 6 reveal some discrepancies which may be due to the

respondents’ difficulties in understanding the question. As could be expected,

communication in own company would be frequent between persons. Therefore, it

is complicated to notice that according to these results, communication in own

company remains rather at the level of “sometimes” than “much” and “very

much”. This discrepancy may be due to an incorrect sample of representatives

from one company as the level of employment should have been better checked

before the respondents were selected. This means that more emphasis should have

been directed to the status of the respondents as for example, the employees, and

the middle managers should have been separated from the representatives of the

top management when the sample was constructed.

The means illustrating the classified use of the Web-based communication tools

are given in table 7. As can be seen, the Intranet is the most used Web-based

application when communicating internally in the own company. Additionally,

Buyer A seems to have the most active respondents who use the Internet pages

and company’s Intranet. However, Buyer A simultaneously represents the most

inactive side of the Extranet users. The 2nd tier suppliers favor the use of Extranet

but on the other hand, in addition to the 1st tier suppliers, they are the most

inactive users of the Internet.

Page 89: Communication

81

Table 7. Use of the Web-based communication tools in own company – Case A

Company’s status The Internet (www)

Intranet Extranet

Buyer A 2,83 **) 3,86 1,50 1st tier suppliers 2,63 3,14 1,50 2nd tier suppliers 2,00 3,22 1,60 TOTAL *) 2,54 3,30 1,52 *) The total means may vary from the individual means with buyer and supplier due to the rounding **) 5 = Uses very much, 4 = much, 3 = sometimes, 2 = rarely, 1 = not at all

According to the results, there seems to be a connection between theory and

empirical findings that support the definition of the Intranet which states that

Intranets are classified for the internal company use. As can be seen from table 7,

the level of the use of Extranets is very low, actually it approaches the use of “not

at all”. This may be due to the scope of this analysis which concentrates on

clarifying the internal use of communication tools in the companies, and therefore

Extranets might receive unexpected results. However, to conclude the data from

table 7, it can be stated that no statistically significant differences were met

between the separate tiers of Case A.

As a whole, the use of Web-based communication tools lies on a quite low level

in case A. The total means show that Intranets are used sometimes, as the use of

the Internet is located somewhere in the axis of “rarely” – “sometimes”. The lack

of use may be due to the embarrassment by the new technology, the company

structure and its human and technical resources, or due to the age structure of the

personnel alias the users.

Besides the Web-based tools, a closer look is taken also to the tools that really are

used in the case companies, or actually in this context, in the separate tiers of the

case companies. These tools are chosen to the more detailed review according to

their rating at the top of the most used communication tools resulted from this

survey. The reviewed tools are fixed phone, cellular phone, e-mail, face-to-face

contact and Intranet. These five communication tools were the most used ones

both in Case A and in Case B.

Page 90: Communication

82

Table 8. Use of the specific communication tools in own company – Case A

Company’s status Fixed phone

Cellular phone

E-mail Face-to-face contact

Intranet

Buyer A 4,71 **) 4,14***) 4,71 3,50 3,86 1st tier suppliers 4,37 3,56 4,63 4,04 3,14 2nd tier suppliers 3,82 2,80***) 4,09 4,50 3,22 Total *) 4,29 3,48 4,52 4,07 3,30 *) The total means may vary from the individual means with buyer and supplier due to the rounding **) 5 = Uses very much, 4 = much, 3 = sometimes, 2 = rarely, 1 = not at all ***) Statistically significant difference

Table 8 provides means which show the use of specific communication tools

inside the own company. As the data from table 8 shows, the most popular tool is

e-mail while the major differences appear by the use of cellular phone. It is worth

noticing that Buyer A uses “much” or “very much” the cellular phone as the 2nd

tier suppliers use it only “sometimes” or “rarely”. Reasons for this may be the

differences in the level of innovation adoption in the case companies and the

varying distribution of cellular phones as a perk. Additionally, Buyer A is a

telecom operator that may create different conditions for the use of cellular phone.

Table 8 also reveals that the level of the use of e-mail approaches very frequent

use. What comes to the use of e-mail and its connection to the operation of a value

net, it is important to recognize the difficulty in distributing and storing of

information in the format of e-mail. E-mail messages are easy to send and forward

but a question remains that who is responsible for the clear organization of the

information storage and further management of that information. For example,

without organized storing of the information lying in e-mail messages, later

searchers for some details are quite complicated to implement.

In the value net one solution for the information management can be the

utilization of Intranets. Intranets enable that information can be saved in electronic

form and it also can be read simultaneously from different places. At the moment

of the survey the use of Intranets is situated at middle level meaning that their use

mainly happens sometimes. Only Buyer A shows indications of more regular use.

Page 91: Communication

83

3.3.2 Case B

Availability of communication tools

Figure 21 provides the availability rates of communication tools in Case B. The

bars are based on the amount of 32 respondents (N=32). As can be seen from the

bars, the most typical communication tools are fixed phone, fax, e-mail, the

Internet and post. It can also be noticed that the availability of Intranets and

Extranets follow the same line of percentages as in Case A. Therefore can be

stated that over half of the respondents have an Intranet as opposed to the about

one-fifth having Extranet as well.

When reviewing the figures related to the availability of communication tools in

accordance with both case A and case B, some highlighting can be made. First,

the main five communication tools available with the respondents are same in

both of the cases. Secondly, the distribution of the Web-based tools follows the

same line which illustrates that Extranets have a such low level of availability

compared to those of the Internet and Intranets.

These congruent inferences may probably be a consequence of the two separate

case studies from the same industry. Both of the case value nets are based on the

key industries in the ICT industry and the suppliers represent the supporting

industries as well in the ICT industry. Although the end-product and thus the

internal business processes of these two case value nets differ from each other, the

typical features of the ICT sector can be identified even in connection with the

availability of communication tools. As figure 21 shows, typical features are

found being linked to the frequent availability of cellular phones and the Internet.

For example, the high rate of the Internet connections reflects the use of

innovative possibilities in business operations compared to the other industries

with probably more limited resources. It may be possible that the ICT cluster can

offer better resources than others due to their first-rate knowledge of the new

technologies.

Page 92: Communication

84

Case Buyer B

PostElectr. conversation

Electronic bulletin

Extranet

IntranetInternet

Communicator

E-mailMobile device

FaxSMSBeeper

Videoconferencing

Cellular phone

Fixed phone

%100

80

60

40

20

0

Figure 21. Availability of communication tools - Case B

The use of communication tools in case companies

As already presented in connection with Case A, this chapter forwards with the

certain structure: First the use of the interactive, non-interactive and Web-based

communication tools is explained, and after that the discussion moves on to the

more specific interpretation of the use of the Web-based tools. Finally, the third

phase reports on the internal use of five specific communication tools in the

companies.

Page 93: Communication

85

Table 9. Use of the interactive, non- interactive, and Web-based communication

tools in own company - Case B

Company’s status Interactive tools Non-interactive tools Web-based tools Buyer B 3,90 **) 3,05 3,83***)

1st tier supplier 3,19 2,14 2,11 2nd tier supplier 3,43 2,23 1,26***)

3rd tier supplier 3,71 2,06 2,33 TOTAL *) 3,57 2,40 2,37 *) The total means may vary from the individual means with buyer and supplier due to the rounding **) 5 = Uses very much, 4 = much, 3 = sometimes, 2 = rarely, 1 = not at all ***) Statistically significant difference

The use of interactive, non- interactive and Web-based communication tools is

shown in table 9 above. To emphasize some points, it can be noted that the use of

the interactive tools approaches the level of “much”, as the use of the non-

interactive, and also the use of the Web-based tools, remains just at the scale of

“rarely”- “sometimes”. Additionally can be stated that Buyer B is the most active

one when considering whatever of the three groups of communication tools. As

well can be remarked the low levels related to the use of the Web-based

communication tools in 2nd tier supplier.

The statistical analysis revealed the existence of the significant difference exactly

by the use of the Web-based tools between Buyer B and the 2nd tier supplier. The

difference may be due to dissimilar backgrounds of the companies as the Buyer B

is a large company and the 2nd tier supplier represents small- and medium-sized

enterprises. These companies may have distinct premises for the development of

the solutions of information technology as well as they may have variances in

human and technical resources.

Generally speaking, the overall use of communication tools seems to be

approximately at the same level as it was in case A. As already been stated by

Case A, the interactive communication tools do not leave any tracks related to

communication. Therefore and particularly in the case of the value, the focus may

be of importance to direct communication to the Web-based tools which enable

the time- independent information delivery.

Page 94: Communication

86

Due to the focus of this study on the Web-based communication tools, the

Internet, Intranet and Extranet are examined in a more detailed way also by case

B. It has to be remembered that concentration is now only on the Web-based

communication and therefore interpretation of the results happens on that basis.

In general, the results from case B follow the same line as the results from case A

also by the Web-based communication tools. As table 10 below shows, Intranets

are the most used ones for communication in own company. According to table

10, Buyer B seems to be the most active user of the Web-based tools. Contrary to

the activity of Buyer B, the 2nd tier supplier represents the lowest means when

considering the Web-based communication.

Table 10. Use of the Web-based communication tools in own company – Case B

Company’s status The Internet (www)

Intranet Extranet

Buyer B 3,71 **) ***) 4,50 ***) 1,67 1st tier supplier 1,60 2,83 1,00 2nd tier supplier 1,44 ***) 1,20 ***) 1,00 3rd tier supplier 1,80 3,50 1,00 TOTAL *) 2,15 3,20 1,12 *) The total means may vary from the individual means with buyer and supplier due to the rounding **) 5 = Uses very much, 4 = much, 3 = sometimes, 2 = rarely, 1 = not at all ***) Statistically significant difference

Statistically significant differences can be noticed by the use of the Internet as

well by the use of Intranets. When considering the Internet option, a major

difference occurs between Buyer B and the 2nd tier supplier. In fact, the same low

level related to the use of the Internet can be seen by every one of the suppliers,

and Buyer B therefore easily distinguishes from the others. The same situation

holds true also in connection with the use of Intranets as Buyer B has the highest

mean which, in fact, approaches the level of “very much”. Reasons for the

differences may be found on variances in the company size, available - both

human and technical - resources, types of innovations, and type of company.

Page 95: Communication

87

One important finding is necessary to consider closer. Based on the data from

table 10 above, the overall use of Extranets seems to be at very low level. Outside

of Buyer B, the other tiers do not use Extranets at all. On one hand, this weakness

may probably be a consequence of the scope of the statistical analysis which

concentrated on the use of communication tools in the companies, not between

them (for which the use of the Extranets is actually defined). Additionally, the

question of the survey may have been understood wrong if there has been some

misunderstanding in concepts such as the Internet, Intranet and Extranet. On the

other hand, the low levels of Extranet use may also result from the actual situation

in which Extranets are not implemented within the separate tiers of suppliers, but

in which Buyer B (the head company) has built its own Extranet and the other

companies are connected to it.

Specific communication tools are also reviewed with case B as was earlier done

with case A. Table 11 below shows the average use of fixed phone, cellular

phone, e-mail, face-to-face contact and Intranet in separate tiers of case B.

Table 11. Use of the specific communication tools in own company – Case B

Company’s status Fixed phone

Cellular phone

E-mail

Face-to-face contact

Intranet

Buyer B 3,14**) ***) 4,13 5,00 5,00 4,50 ***)

1st tier supplier 4,50 ***) 1,50 ***) 4,67 4,33 2,83 2nd tier supplier 4,20 3,33 4,80 4,63 1,20 ***)

3rd tier supplier 3,80 4,75 ***) 4,67 4,20 3,50 TOTAL *) 3,93 3,52 4,80 4,56 3,20 *) The total means may vary from the individual means with buyer and supplier due to the rounding **) 5 = Uses very much, 4 = much, 3 = sometimes, 2 = rarely, 1 = not at all ***) Statistically significant difference

As can be seen from the total means, e-mail is the most used communication tool

also in case B. Its average use approaches the quantity of “very much” which may

cause difficulties in information delivery to the other than the prevailing person(s)

as receiver(s) on the actual sending moment. It is worth noticing that although the

overall trend favors Buyer B as the most active user of any of those

communication tools, there is an extensive difference between the use of cellular

Page 96: Communication

88

phone by the 1st and the 3rd tier supplier. As the 1st tier supplier’s use of cellular

phone approaches the level of “not at all”, the 3rd tier supplier uses it almost “very

much”. An explanation for this can be found in different backgrounds as the 1st

tier supplier includes in small- and medium-sized enterprises and the 3rd tier

supplier is a large company. Therefore in context of the last mentioned company,

the cellular phones may be perks and that is the reason for the high levels of its

use.

Statistically significant differences appear by fixed phone and cellular phone, in

addition to Intranet. Contrary to three distinguishable groups of case B, case A

had just one group in which the means differed remarkably from each other.

Therefore can be stated that case B has more variance in means than case A have.

The reason for the discrepancy between case A and B can be attributed to the

different power of the buying company. Case B may have a more innovative and

advanced heading company (Buyer B) which develops its operations in a clear

sense of direction and in knowledge of future technology possibilities. Moreover,

case B had just a few suppliers and the amount of suppliers in case A approached

nearly ten companies. This fact may also have had some influence on the

discrepancies between these cases.

3.3.3 Summary

This chapter concludes the main results from the empirical survey. Some points

related to the availability as well as to the use of the communication tools are

discussed. Also some issues related to the survey are stated. The major findings

that concern communication tools and their linkage and role in a value net

environment are dealt with in the next chapter - Summary and Conclusions.

First the consideration is addressed to the availability of the communication tools.

Both of the case value nets had the same top five tools that were fixed phone, fax,

e-mail, the Internet and post. According to the classification presented in the

theoretical part of this study, the fixed phone represents interactive

Page 97: Communication

89

communication tools and the rest of those five tools belong to the group of non-

interactive tools. One thing related to fax is interesting to state: Faxes were well

available as they included in the most common devices. However, when

concerned the five most used tools, the fax did not appear in any case. This may

be due to the fact that faxes are mainly used for external communication between

distinct companies, for example, to send orders and stock balances to the

counterparts or to receive some other documents. There are other tools which are

utilized when communicating internally.

What comes to the Web-based communication tools, the findings reveal that the

Internet was quite well available, but the lead over the presence of Intranets and

Extranets is remarkable. Additionally, the levels of the use of Web-based

communication reflect the trend that the benefits of the Web need to be proofed.

Both case A and case B revealed that the Web-based communication tools are

only sometimes used for internal communication. The only exception was Buyer

B which showed the level of nearly “much” use of the Web-based tools.

Buyer A (N=7)Fixed phone (4,71)E-mail (4,71)Cellular phone (4,14)

1st tier suppliers (N=33)E-mail (4,63)Fixed phone (4,37)Face-to-face –contact (4,04)

2nd tier suppliers (N=12)Face-to-face contact (4,50)E-mail (4,09)Fixed phone (3,82)

Buyer B (N=8)E-mail (5,00)Face-to-face contact (5,00)Intranet (4,50)

1st tier supplier (N=6)E-mail (4,67)Fixed phone (4,50)Face-to-face contact (4,33)

2nd tier supplier (N=11)E-mail (4,80)Face-to-face contact (4,63)Fixed phone (4,20)

3rd tier supplier (N=7)Cellular phone (4,75)E-mail (4,67)Face-to-face contact (4,20)

Buyer A (N=52) Buyer B (N=32)

Buyer A (N=7)Fixed phone (4,71)E-mail (4,71)Cellular phone (4,14)

1st tier suppliers (N=33)E-mail (4,63)Fixed phone (4,37)Face-to-face –contact (4,04)

2nd tier suppliers (N=12)Face-to-face contact (4,50)E-mail (4,09)Fixed phone (3,82)

Buyer B (N=8)E-mail (5,00)Face-to-face contact (5,00)Intranet (4,50)

1st tier supplier (N=6)E-mail (4,67)Fixed phone (4,50)Face-to-face contact (4,33)

2nd tier supplier (N=11)E-mail (4,80)Face-to-face contact (4,63)Fixed phone (4,20)

3rd tier supplier (N=7)Cellular phone (4,75)E-mail (4,67)Face-to-face contact (4,20)

Buyer A (N=52) Buyer B (N=32)

Figure 22. Three internally most used communication tools in the case companies

Page 98: Communication

90

Figure 22 presents three of the internally most used communication tools. As can

be seen, e-mail exists among the three most used communication tools in every

level in both of the case value nets. While other companies use some kind of

device to communicate, the 2nd tier suppliers in case A prefer the face-to-face

contact when communicating internally in the company. As a whole, none of the

firms deviate significantly from others.

After the follow-through of the Web survey some statements for the further

research can be made. First, the size of the sample was quite small due to the

purpose of a descriptive case study. If generalizations were aimed to make, the

sample should have been bigger and random. On that basis, it had represented the

population better. Additionally in this study, the distinct firms in case A were

integrated with each other which meant that individual details of the companies

may have disappeared. However, the main features of the distinct tiers of the

suppliers were able to found.

As a whole, more attention should have been paid to the scales which measured

the level of the use of the communication tools. In this survey the scale – from

“very much” to “rarely” and “not at all” - was quite open to various

interpretations. In this context, the adjectives such as “daily”, “weekly” or

“monthly” would have described the level better.

Page 99: Communication

91

4 SUMMARY AND MAIN FINDINGS

In this study the use of communication tools was examined. In the theoretical part,

the purpose was to define the concept of a value net as well as to argument the

classification of communication tools into the interactive and non-interactive

mediums. Furthermore, the objective of the empirical part was twofold: First, the

aim was to clarify the answer to the research problem of how communication

tools are used internally in the companies in the value nets. Secondly, there was a

need to examine that how the Interne t, and particularly the Web, can be utilized

during the data collection process. Finally, the end results tend to show the current

state of the use of the communication tools in two separate case value nets. Due to

the delimitation of the subject of this thesis and the manifold spectrum of possible

relationships in the structure of the value net, the empirical part was limited to

concern only the communication inside the case companies in the separate levels

of the value net in case. Internal communication was chosen as the focus of the

study because internal conditions create the base for external communication.

In the theoretical part of the study the classification of communication tools was

made. After failed to search for suitable classification arguments, the researcher

compiled the classification which divided communication tools into the interactive

and non-interactive tools. Moreover, the non-interactive communication tools

were divided into the Web-based and other communication tools. The ground for

this classification was based on the conversations with the specialists of the ICT

industry.

The empirical part of the study focused on clarifying the current availability and

the use of the communication tools in two case value nets. Particular attent ion was

paid to the Web-based communication tools which are the Internet pages, and the

Web-based applications of an Intranet and an Extranet. Additionally, the nature of

the Web was studied in practice as the questionnaire survey was made for the use

in the Web.

Page 100: Communication

92

Despite its descriptive nature, this study reported here would seem to indicate

some issues which are important to consider when planning a universal

communication system for a value net. Once more it is pointed out that this study

has aimed to answer the question of how are communication tools used internally

in the companies of the value nets. The answers create a base for further research

of inter-organizational communication and development of a universal

communication system for a value net environment.

Due to the emphasis on the Web-based communication tools in this thesis, the

Web-related issues are discussed at first. The results of this study revealed that in

both of the cases the use of Web-based communication is still either a new or

unfamiliar medium to exchange information. In fact, Buyer B seems to the at the

most advanced state of what comes to the use of the Web-based communication

tools as opposite to some of the case companies that are just starting to implement

the Web solutions.

The reasons for the low levels of the utilization of the Web can be explained in

several ways. First of all, there has to be need for such a Web-based system before

any further plans or implementations are made. Managers in all level of the

company must understand and accept the role of the Web, and the Internet, in

business operations because in addition to the firm’s know-how, it is information

technology that enables and creates competitive advantage in today’s market.

Secondly, the starting costs as well as costs of maintenance may create barriers to

the implementation of the Web tool because such information systems must have

proper data security solutions to protect critical business information.

Additionally, the managers need to have adequate knowledge and gumption to

follow through the forth-coming reforms of business processes and ways to work.

Finally, the company must find suitable persons who have the know-how of the

way of how to implement the Web-based communication tool, either an Intranet

or an Extranet.

Page 101: Communication

93

To improve inter-organizational communication, the internal aspects must be well

managed and controlled at first. Benefits and weaknesses of each of the

communication tools need to be clarified, understood and adopted, and on that

basis a universal communication system can be built. Due to the number of

dynamic members in a value net, common and lean communication conventions

should be developed and implemented in the companies involved. For example,

advices for the situations when interactive communication have to be replaced

with non- interactive communication should be compiled and alternative

communication tool should be named. Also regulations and recommendations for

the information management should be available for the employees and managers

of the value net companies. Additionally, due to the dynamic nature of a value net,

these regulations and their compliance have to made so simple and easy that

persons are able to adopt them when entering a value net. In any case,

communication between persons and therefore between companies is the function

which enables all of the business operations.

The results of this study revealed that value net needs efficient and effective

communication to operate properly, and thus Web-based communication tools are

required to enable transparent and timely availability of information and its

accurate delivery to the members of a value net. Therefore, further research

should be addressed to the investigation of the influence of the company’s

background on the use of the Web-based communication tools. In other words,

does a large company have different premises for the use of the Web-based

communication tools than a small- and medium-sized enterprise? Additionally for

the development of universal communication system, it is worth studying the state

of external communication between the members of a value net.

Page 102: Communication

REFERENCES

Literature references

Ali-Jyrkkö, Jyrki; Paija, Laura; Reilly, Catherine & Ylä-Anttila, Pekka (2000).

Nokia - A Big Company In A Small Country. ETLA - The Research Institute of the

Finnish Economy B 162 Series. Vantaa: Tummavuoren kirjapaino Oy.

Allee, Verna (2000). Reconfiguring the Value Network. Journal of Business

Strategy, July / August 2000: 36-39.

Andrews, Philip P. & Hahn, Jerome (1998). Transforming supply chains into

value webs. Strategy & Leadership, July / August 1998: 7-11.

Andrews, Philip P. & Hahn, Jerome (1999). Value web management

opportunities. International Journal of Physical Distribution and Logistics

Management, 29(5): 305-307.

Anonymous (2000). Internet. Encyclopedia Britannica Online. Available at:

http://search.eb.com/bol/topic?=eu=1460&sctn=1&pm=1. Referred on June 16th

2000.

Baker, Sunny (2000). Getting the most from your Intranet and Extranet strategies.

Journal of Business Strategy, 21(4): 40-43.

Blueroom (2001). Internet. Available at: http://www.blueroom.com/internet.

Referred on June 18th 2001.

Bovet, David & Martha, Joseph (2000a). Value nets: reinventing the rusty supply

chain for competitive advantage. Strategy & Leadership, April 28

Page 103: Communication

Bovet, David & Martha, Joseph (2000b). From Supply Chain to Value Net. The

Journal of Business Strategy, July / August 2000: 24-28.

Bovet, David & Martha, Joseph (2000c). Value Nets - Breaking the supply chain

to unlock hidden profits. New York: John Wiley & Sons Ltd.

Carbone, James (2000). Buyers eye online meetings, seminars, trade shows.

Journal of Purchasing, June 15: 74-76.

Cartwright, Shawn D. (2000). Supply Chain Interdiction and Corporate Warfare.

Journal of Business Strategy, March / April 2000: 30-35.

Chandrashekar, Ashok & Schary, Philip B. (1999). Toward the Virtual Supply

Chain: The Convergence of IT and Organization. The International Journal of

Logistics Management, 10(2): 27-38.

Couper, Mick P. (2000). Web Surveys: A Review of Issues and Approaches.

Public Opinion Quarterly, 64: 464-494.

Cox, Andrew (1996). Relational Competence and Strategic Procurement

Management. Towards an Entrepreneurial and Contractual Theory of the Firm.

European Journal of Purchasing & Supply Management, 2(1): 55-70.

Cross, Gary J. (2000). How e-business is transforming supply chain management.

Journal of Business Strategy, March / April 2000: 36-39.

Eisenhardt, Kathleen M. (1989). Building Theories from Case Study Research.

Academy of Management Review, 14(4): 532-550.

Page 104: Communication

Elfvengren, K.; Koivuniemi, J; Kärkkäinen, H.; Ojanen, V.; Sundqvist, S. &

Torkkeli, M. (2001). Challenges of innovation management in

telecommunications industry. Paper presented at ISPIM conference 2001,

Lappeenranta University of Technology.

Ellram, Lisa M. & Carr, Amelia (1994). Strategic Purchasing: A History and

Review of the Literature. International Journal of Purchasing and Materials

Management, Spring 1994: 10-18.

ENX (2001). Internet: European Network Exchange. Available at:

http://www.enxo.com/89.html. Referred on March 16th 2001.

The European Union (2001). Internet. Available at:

http://europa.eu.int/index_en.htm. Referred on June 21st 2001.

Gattorna, John L. (ed.) (1998). Strategic supply chain alignment. Hampshire:

Gower Publishing Limited.

Graham, Gary & Hardaker, Glenn (2000). Supply-chain management across the

Internet. International Journal of Physical Distribution and Logistics

Management, 30(3/4): 286-295.

Harland, Christine (2000). Lecture on Telecommunications Summer School,

August 2000, Lappeenranta University of Technology.

Heikkilä, Tarja (1998). Tilastollinen tutkimus. Helsinki: Oy Edita Ab.

Hirsjärvi, Sirkka; Remes, Pirkko & Sajavaara, Paula (2000). Tutki ja kirjoita. 5th

ed. Tampere: Tammer-Paino Oy.

Home, Niilo (1994). Ideasta tutkimussuunitelmaksi - Ohjeita tutkielmantekijälle.

2nd ed. Helsinki: Helsingin kauppakorkeakoulun kuvalaitos.

Page 105: Communication

Jick, Todd D. (1979). Mixing Qualitative and Quantitative Methods:

Triangulation in Action. Administrative Science Quarterly, 24: 602-611.

Kardaras, Dimitris & Papathanassiou, Eleutherious (2000). The development of

B2C e-commerce in Greece: current situation and future potential. Internet

Research: Electronic Networking Applications and Policy, 10(4): 284-294.

Karjalainen, Niko (2000). Sähköinen liiketoiminta - haaste strategialle. Porvoo:

WSOY Bookwell Oy.

Karrus, Kaij E. (1998). Logistiikka. Helsinki: WSOY.

Lamming, Richard (1993). Beyond Partnership - Strategies for Innovation and

Lean Supply. Cornwall: Precentice Hall.

Landau, Sidney I. (ed.) (1996). The new international Webster's student

dictionary of the English language. 1996 edition. USA: Trident Press

International.

Larson, Paul D. & Kulchitsky, Jack D. (2000). The Use and Impact of

Communication Media in Purchasing and Supply Management. The Journal of

Supply Chain Management, Summer 2000: 25-39.

Leminen, Seppo (1999). Gaps in Buyer-Seller Relationships - Case Studies in the

Telecommunication Industry. Dissertation. The Swedish School of Economics and

Business Administration. Helsinki: Yliopistopaino.

Longman (1987). Longman Dictionary of Contemporary English. 2nd ed.

Longman.

Mercer Management Consulting, Inc. 2001. Internet. Available at:

http://www.valuenets.com/book/faq.html. Referred on June 4th 2001.

Page 106: Communication

Moore, Geoffrey A. (1995). Inside the Tornado. 1st ed. Padstow, Cornwall: T.J.

International Ltd.

Nokia (2001). Internet. Available at:

http://www.nokia.com/mobilecity/communicator.html Referred on June 19th 2001.

Ollus, Martin; Ranta, Jukka & Ylä-Anttila, Pekka (ed.) (1999). Verkostojen

vallankumous - Miten johtaa verkostoyritystä? Vantaa: Tummavuoren Kirjapaino

Oy.

Paija, Laura (2000). ICT Cluster - The Engine of Knowledge-Driven Growth in

Finland, ETLA Discussion Paper No. 733. Helsinki: Yliopistopaino.

Paija, Laura (ed.); Rönkkö, Perttu & Steinbock, Dan (2001). Finnish ICT Cluster

in the Digital Economy B176 Series. Helsinki: Yliopistopaino.

Parker, D. & Hartley, K. (1997). The Economics of Partnership Sourcing versus

Adversarial Competition. A Citigue, 3(2): 115-125.

Parolini, Cinzia (1999). The Value Net. Chichester: John Wiley & Sons, Ltd.

Porter, Michael (1985). Competitive advantage: creating and sustaining superior

performance. New York: The Free Press.

Puska, Tiina (2000). The Possibilities of IP Networks in Strategic Partnership

Development. Working Paper No. 6. Lappeenranta University of Technology,

Telecom Business Research Center.

QuestNet (2000). Software for the web survey. Lappeenranta Verkonmerkki Oy.

Page 107: Communication

Ramsay, J. (1998). Problems with empiricism and the philosophy of science:

Implications for purchasing research. European Journal of Purchasing & Supply

Management, 4: 163-173.

Reingoldt, Teemu (2001). The new era of value creation. Case: Sonera Zed.

Master's Thesis. Department of Business Administration, Lappeenranta University

of Technology. Lappeenranta.

Riggins, Frederik J. & Rhee, Hyeun-Suk (1998). Toward a Unified View of

Electronic Commerce. Communications of the ACM, 41(10): 88-93.

Ringle, Bill (1999). How to Avoid Getting Caught in the Net. Canadian Manager,

Spring 1999: 15-16.

Saunders, Malcolm (1997). Strategic Purchasing and Supply Chain Management.

2nd ed. Glasgow: Pitman Publishing.

Schramm, W. (1971). Notes on case studies of instructional media projects.

Working paper. The Academy for Educational Development, Washington, DC.

Sherer, Susan A. (1999). Information Systems in Manufacturing Networks.

International Journal of Electronic Commerce, 4(1): 23-43.

SPSS, Inc. (1996-2000a). SPSS Data Entry Builder 3.0. Software for the Web

survey.

SPSS, Inc. (1996-2000b). SPSS for Windows. 10.0. Statistical software.

Survissimo (2001). Internet. Available at: http://www.survissimo.org. Referred on

May 22nd 2001.

Page 108: Communication

Teo, Thompson S.H. & Tan, Margaret (1998). An empirical study of adoptors and

non-adoptors of the Internet in Singapore. Information & Management, 34: 339-

345.

Timmers, Paul (1999). Electronic commerce: strategies and models for business-

to-business trading. Chichester: John Wiley & Sons Ltd.

Varis, Jari (ed.) (2001). Kumppanuudella kasvuun. Lappeenranta: Lappeenranta

University of Technology, Telecom Business Research Center.

Virolainen, Veli-Matti (1998). Motives, Circumstances and Success Factors in

Partnership Sourcing. Dissertation. Lappeenranta University of Technology.

Whatis.com (2001). Internet. Available at: http://www.whatis.com. Referred on

February 21st 2001.

World Trade Organization (2001). Internet. Available at: http://www.gatt.org/.

Referred on June 21st 2001.

Yin, Robert K. (1994). Case study research design and methods. California: Sage

Publications.

Zwass, Vladimir (2000). Internet. Electronic commerce. Encyclopedia Britannica

Online. Available at: http://search.eb.com/bol/topic?=eu=138395&sctn=1&pm=1.

Referred on June 16th 2000.

Interviews and other discussions

Director (2001a). Business Development, Cable 1. Interviewed on April 18th

2001.

Page 109: Communication

Director (2001b). Procurement and Logistics, Buyer A. Interviewed on March

22nd 2001.

Eerola, Paavo (2001). Vendor Manager, Sonera Corporation. Interviewed on June

14th 2001.

Holmalahti, Antero (2001). Vice President, Development and Material

Management, Metso Paper. Interviewed on February 27th 2001.

Kemppainen, Pasi (2001). CEO, Intellitel Communications. Interviewed on March

22nd 2001.

Project Workshop (2001). ”Information Technology in Business Relationships”.

Workshop held in Lappeenranta University of Technology on June 7th 2001.

Puumalainen, Kaisu (2001). Professor of International Marketing, Lappeenranta

University of Technology. Interviewed on July 6th 2001.

Virolainen, Veli-Matti (2001a). Professor of Supply Management, Lappeenranta

University of Technology. Interviewed on April 17th 2001.

Virolainen, Veli-Matti (2001b). Professor of Supply Management, Lappeenranta

University of Technology. Interviewed on July 7th 2001.

Page 110: Communication

Appendix I

EXPLANATIONS OF TECHNICAL TERMS

Authentication

The process of determining whether someone or something is, in

fact, who or what it is declared to be. In private and public

computer networks (including the Internet), authentication is

commonly done through the use of logon passwords.

Digital certificate

An electronic "credit card" that establishes your credentials when

doing business or other transactions on the Web.

Encryption Encryption is the conversion of data into a form that cannot be

easily understood by unauthorized people

EDI Electronic Data Interchange- a standard format for exchanging

business data.

Firewall A firewall is a set of related programs, which are located at a

network gateway server that protects the resources of a private

network from users from other networks.

FTP File Transfer Protocol - a standard Internet protocol, is the simplest

way to exchange files between computers on the Internet

HTML Hypertext Markup Language - the set of markup symbols or codes

inserted in a file intended for display on a Web browser page

HTTP The Hypertext Transfer Protocol - the set of rules for exchanging

files (text, graphic images, sound, video, and other multimedia

files) on the Web.

IP The Internet Protocol - the method or protocol by which data is

sent from one computer to another on the Internet.

SMTP Simple Mail Transfer Protocol - a TCP/IP protocol used in sending

and receiving e-mail

TCP/IP Transmission Control Protocol/Internet Protocol - the basic

communication language or protocol of the Internet.