Mobile Service Innovation and Business Models
Mobile Service Innovation and Business Models
This book is sponsored by the Freeband Communication Project Frux. More information:
www.freeband.nl
This work is subject to copyright. All rights are reserved, whether the whole or part of the material is
concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, roadcasting,
reproduction on microfilm or in any other way, and storage in data banks. Duplication of this publication
or parts thereof is permitted only under the provisions of the German Copyright Law of September 9,
1965, in its current version, and permission for use must always be obtained from Springer. Violations
are liable to prosecution under the German Copyright Law.
The use of general descriptive names, registered names, trademarks, etc. in this publication does not
imply, even in the absence of a specific statement, that such names are exempt from the relevant protective
laws and regulations and therefore free for general use.
5 4 3 2 1 0
springer.com
Table of Contents
Part I Theory
Introduction.................................................................................................. 3
H. Bouwman, T. Haaker, and H. De Vos
Part II Applications
Abbreviations........................................................................................... 297
References................................................................................................ 301
Developing new services and bringing them to the market successfully are
the great challenges that many companies and organizations face today.
Technological developments in information and communication techno-
logy act as drivers and enablers of many service innovations. For example,
the distribution of content no longer depends entirely on physical carriers
but makes use of a variety of broadband networks, both fixed and wireless.
In the public sector, electronic government services have been introduced,
and in the health care sector much is expected of electronic record sharing
and Tele-health. The ultimate success of these new services is, however,
not determined by the technological possibilities but by their capability to
satisfy needs better than existing alternatives. New services need to create
value for their customers and, equally important, allow providers to
capture a portion of that value. This means that services require viable
business models, i.e., adoption by users and long-term profitability for the
providers. Profitability should be understood in a broad sense; it may
involve less tangible societal benefits as well.
Designing viable business models is difficult, as customer needs,
organizational resources and capabilities, financial arrangements, and
technological possibilities have to be taken into account. Especially in the
mobile domain, a joint effort by many parties is required to realize a
service offering. Moreover, business models and new service offerings of
traditional providers are competing with grassroots services such as user
generated content.
This book provides a theoretical framework for the description of
business models. Furthermore, it provides practitioners with a structured
and practical approach to business model design, taking different
perspectives into account. Hopefully this will help to increase the chance
of successful market introduction of new services.
model can only be viable in the long run if it creates value for users and
providers. That is the bottom line.
The aim of this book is to provide a theoretically grounded yet practical
approach to designing viable business models for electronic services,
including mobile ones. We develop a conceptual business model framework,
i.e. the STOF model, and a business model design method based on this
framework, i.e., the STOF method. In our framework we take a ‘holistic’
view on business models. We consider them from four interrelated
perspectives, i.e., service, technology, organization and finance perspective.
The STOF model not only considers the relevant design variables in each
perspective but also elaborates on critical design issues, which are those
design issues that can be expected to have a large influence on business
model viability.
We focus on business models for mobile services, i.e., all kinds of
innovative services that combine technologies and concepts from the area
of telecommunication, information technology and consumer electronics.
Mobile services typically require cooperation in complex value networks.
We therefore take a network view when describing and designing business
models, i.e., a multi-actor business model as opposed to the business
model of a single firm. Finally, it is relevant to mention that we take a
dynamic viewpoint, i.e., we explicitly take the dynamics of business
models due to environmental influences into account.
The STOF method may be viewed as a practical implementation of the
STOF model for designing business models. It supports the formulation of
balanced design choices for the business model elements. It takes the
critical design issues into account, as well as the critical success factors for
business model viability. The method provides a systematic approach to
new service development and underlying business model design. We have
reason to believe that our approach is also valuable for services outside the
mobile realm.
This book and the models and cases described herein are the fruit of a
long-term research effort that started around 2002, although roots of the
project can be traced back to the 1990s. The research was mostly carried
out within the Freeband and Freeband Impulse programs, the leading
Dutch research programs on advanced mobile technologies and
applications. Starting out with first descriptions of business model
domains, the dynamic STOF model and design method gradually took
shape in an iterative fashion. Iterations involved refinements and
enhancements based on literature as well as practical experiences with our
models and method.
We believe this book provides a structured view on business models and
a systematic approach to designing business models. While such approach
Introduction 5
All in all, the sheer size of the services sector in the overall economy,
their potential in creating economic growth and welfare (through
considerable opportunities for productivity gains) motivates the interest in
service innovation. The European Commission (2003) has emphasized the
relatively low productivity and performance of many services sectors,
while O’Mahony and Van Ark (2003) have pointed at the limited use
many services in Europe make of ICT. Nevertheless, due to the as yet
small but rising share of services in business (technological) innovation
expenditures, policy-makers as well as decision makers in the manufac-
turing and service industry seriously need to reconsider their innovation
policy and strategy, and to focus on service innovation, if only because
investments in innovation by private service firms in the US are
considerably higher than in Europe.
From a micro-economic point of view, the Reneser study (2006) has
shown that service firms, i.e. firms whose main focus is on services, like
banks and telecommunication operators, are beginning to tackle service
innovation more energetically. Nevertheless, the main focal points of
service innovation and the way it is organized, budgeted and managed are
designed in a diverse way and there is considerable variety among the
particular service firms. Based on the Reneser study, we can draw the
following conclusions:
These conclusions from the Reneser study make it clear that much
progress can still be made in the service innovation domain, and that
service innovation deserves the attention of managers and scientists alike.
In the next section we take a closer look at the service innovation drivers
and trends at a business level.
There are four basis characteristics of (consumer) services that are often
emphasized in defining services (Grönroos, 1992):
service (or product) possible and competitive. Support services have the
potential to enhance the user experience of a core service. For instance, the
core service of MSN messenger is text-based communication combined
with online presence. Support services are, for instance, profile matching,
price comparison and emoticon trade. Core products or services are
supplemented by ‘peripheral’, ‘auxiliary’ or ‘hidden’ services (e.g. the way
questions are answered or information is provided, service recovery
procedures, directions for consumption of the core offer, etc.). These are
services that the end-user typically does not see (Grönroos, Heinonen,
Isoniemi, & Lindholm, 2000; Normann, 2000). ‘Auxiliary services’ are,
therefore, often non-billable, and although they are not primarily what the
customer pays for, they have a large impact on customer satisfaction and
the effectiveness of the sales cycle (Grönroos, 2000).
Service typologies can be made on the basis of specific characteristics,
for instance the degree of labour intensity, i.e. comparing labour costs with
capital costs, for instance in the case of auto repair services versus IT
services. Services can also be defined based on the level of interaction and
customization, for instance service in retail versus services delivered by
lawyers, doctors and architects. Another distinction may be related to the
recipient of the service, i.e. people, for example health care and enter-
tainment services, or objects (things), for example dry cleaning. The
service can be continuous, i.e. electric utility or police, or discrete, for
instance cell-phones or season tickets. Some services require subscription
or membership, i.e. frequent flyer programs or insurance, while others are
more informal in nature, i.e. the use of a public highway or pay phone.
Services may be available at a single site, i.e. theatre or barber shop, or on
multiple sites, i.e. mail delivery. Services may require customers to be
mobile, i.e. theatre, bus services, or they may require the service provider
to be mobile, for instance taxi, mail delivery. Services may have to cope
with peak demands that will cause delays, for instance telephony and
electricity, or peak demands that exceed capacity, like movie theatres or
transportation. Services can be directed at the consumer or business
market, they can be industrial services related to operations and
maintenance or they can be information-based. Services can be classified
according to domains like transportation, hospitality, government,
financial, entertainment, professional services, IT services, industrial
services, et cetera, or they can be based on self-service concepts and the
use of hard- and software, or involve other persons at the moment of
service delivery.
20 H. Bouwman and E. Fielt
hardware and communication networks. This has major implications for the
service characteristics. Electronic services can be accessed anytime and
anywhere. Electronic services are information-intensive: digital information
plays a key role and is very easy to duplicate and transfer. The role of the
customer is also different in the case of electronic services: customers play a
more active role via self-service. Electronic services are less personal and
use websites, web forms and/or email. No personal relationship between
the customer and the company is required. Electronic services can adapt to
the customer via (predefined) options for personalization by the customer or
customization by the provider. With electronic services, (unexpected)
exceptions are not possible, because the rules are set by software and
hardware. Electronic services can be consumer services, for instance
services delivered by the media industry, but also services as developed by
users themselves and are labelled with Web 2.0. But also eHealth, ePayment
services, marketplaces, eTravel, distant education and eLearning, et cetera
are services that are provided via the Internet or via mobile networks.
Mobile services are a specific subset of electronic services. A mobile service
is a service that is offered via mobile and wireless networks. This assumes
mobility on the part of the user of the services, the devices or applications.
We will discuss mobile services in more detail in Chap. 4.
Although electronic services are an example of pure play – complete
digitization of the service channel – in practice we see that multi-channel
approaches are far more common (Simons, 2006). Firms use multiple
channels to deliver services, and look for synergy between channels as
well as channel coherence. Channels have to cooperate to maximize
overall customer value in such a way that the strengths of each channel are
used and the various channels complement each other. A seamless and
consistent customer experience across the channels will evoke customer
trust, which will reinforce the relationship. From a cost savings perspective
it is also crucial to strive for synergy effects between the various channels.
We adhere to the narrow definition of channel synergy (Power, 2000)
which emphasizes reusing assets to minimize costs.
To summarize, electronic services make it possible to provide services
anytime and anyplace. Especially, information-intensive services, as
distinguished from more labour-intensive and personal types of services,
benefit from the emergence of advanced information and communication
technology. Self-service supported by the appropriate software and
hardware allow customers to deal with services on their own conditions.
22 H. Bouwman and E. Fielt
Fig. 1.1. Four dimensional model of service innovation (based on Den Hertog,
2000)
24 H. Bouwman and E. Fielt
In the 1970s, the concept of business model was used to describe and map
business processes and information and communication patterns within
companies, for the purpose of building Information Technology (IT)-
systems (Konczal, 1975; Stähler, 2001). More recently, business models
have been related to market structures and the place individual companies
occupy within those structures (Porter, 2001). Sometimes, the concept is
used to describe co-ordination mechanisms in economic processes, i.e.
markets or hierarchies, or to discuss intermediation or dis-intermediation
trends (Hawkins, 2002; Mahadevan, 2000; Tapscott, Lowi, & Ticoll,
2000). In other studies, the implementation of a specific market model, for
example the e-shop, e-mall or electronic auction, is discussed in terms of
business models (Ajit & Van Heck, 2002; Timmers, 1998). Very often, a
single aspect is emphasized, for example in the Business to Consumer
(B2C)-model for the retail sector (Lee, 2001; Roussel, Daum, Flint, &
Riseley, 2000), or Business to Consumer and Business to Business (B2B)
32 H. Bouwman, E. Faber, T. Haaker, B. Kijl, and M. De Reuver
are discussed (Alt & Zimmermann, 2001). Recently, business models have
been related to peer-to-peer file sharing services (Hughes, Lang, &
Vragov, 2007).
In addition, business models are more and more related to strategic
choices companies are making (Hedman & Kalling, 2003; Porter, 2001).
Strategies are increasingly translated into business models. Nowadays,
many business ventures have a limited interest in formulating strategies.
Instead, they formulate business models (Hedman & Kalling). To a large
extent, strategies determine the basis of the business case: the concrete
operational implementation of business strategy in a business model. The
business model is given shape by answering questions with regard to
customer needs, the way services are provided, the availability and the way
in which the necessary technical, financial and human resources and
capabilities are put in place, the way processes are defined, et cetera.
Information and communication technology, i.e. Internet and mobile
technologies, play an increasingly important role, not only in the
organizational processes (back office), but also in the channels that are
needed to deliver products and services to their end-users (front office).
As a result, the concept of business model is also closely related to that of
business modeling, which describes organizational and/or transactional
processes, using Business Process Modeling Notation (BPMN), and object-
oriented modeling language, such as Unified Modeling Language (UML), or
Integration Definition Function Modeling-family (IDEF). The concept of
business models has been established in scientific research within a short
period of time and can be considered to be multi-disciplinary in nature. In
disciplines including strategic management, information systems, innovation
studies, economics, e-business and marketing research has been conducted
with regard to business models. The overall result, however, is that, although
the business model concept is used broadly, as yet a single coherent
description is lacking (Mahadevan, 2000).
2.1.1 Definitions
2.1.2 Classifications
2.1.3 Components
Hedman and Kalling (2003) rightfully point out that relevant literature
regarding business models is dominated by descriptions of “specific”
empirically identified business models, and that little attention has been
paid to the theoretical sub-constructs of these models. Business models are
Chapter 2 Conceptualizing the STOF Model 35
about the components that have to be discussed, designed, catered and put
in place to deliver a service to end-users. The latter is more about
ontology: an explicit (and often formalized) specification of a (shared)
conceptualization (Borst, 1997; Gruber, 1995) into the components or
elements, relationships, vocabulary and semantics of the core object
(Pigneur, 2004). The fact that the conceptualization is shared means that
common concepts can and have to be communicated between the actors
involved.
This leads to the question: what are these basic elements or components
of a business model? Alt and Zimmerman (2001) suggest that there are a
few elements that commonly turn up in definitions of business models:
between four and eight, while in all, 24 different items are mentioned
(Morris, Schindehutte, & Allen, 2005) – can be summarized in terms of
strategic choices, value creation, value networks and capturing of value.
The existence of so many different classifications of components, illustrate
the lack of a common framework. In our approach, we will therefore focus
on customer value, and on the organizational, technical and financial
arrangements needed to provide a service that offers value to customers
and allows the providers of the services to capture value as well. In our
view, business models have to focus on four domains: service, technology,
organization and finance, and within these domains different components
play a role. We will discuss these four domains (see Fig. 2.1) in greater
detail, and also take a closer look at the theoretical and technological
concepts that are the basis for our framework, and that will lead the design
of business models.
Business model
Service domain
e.g. Value proposition,
Target group
S
Value for
customers
Technology domain Organization domain
e.g. Service delivery e.g. Division roles,
system
Network strategy
T O
Value for service
providers
Finance domain
e.g. Revenue model
In our opinion, the starting point for any business model is the customer
value of a product or service that an individual company or network of
companies has to offer and which will satisfy customer demands. We start
from the service definition and focus first of all on the value proposition.
The service definition serves as a reference for the other domains. The
Chapter 2 Conceptualizing the STOF Model 37
customer value of the service is the most relevant aspect of the service,
specifically if one wants to offer a service that really matters to users.
Although technology is basically a driver for new innovative services and
business models (push-model), from a customer perspective technology is
only an enabler. In the latter case technology pull plays a central role, one
that can only be understood from a customer value perspective and one
that requires an understanding and elaboration of user requirements. After
discussing the service and technology domain, we address the organization
domain, the way resources are made available, and the finance domain,
which includes investments as well as, for instance, pricing strategies.
Each domain description starts with theoretical notions about the
relevant concepts and issues with regard to that domain. The concepts that
are most relevant from a design perspective are subsequently addressed
and included in a descriptive conceptual domain model. The relationships
between the concepts within and between the domains are discussed.
Pricing, for example, is an important concept in both the service domain
and the finance domain, influencing not only customer value, but also the
revenues that can be expected. The four descriptive domain models
together provide a descriptive conceptual framework for the design of
business models. The initial letters of the four domains, Service,
Technology, Organization and Finance, together make up our four-letter
acronym “STOF”, which is the name for our business model framework.
As we discussed before service concepts are the starting point for our
approach. There are a number of generic issues that play a role in
conceptualizing services, such as customer value. Moreover when we
specify the service concept to the mobile domain some other issues ask for
closer attention, for example the concept of mobility, and the specific
value of mobile services. We will discuss these issues in more detail.
Customer value and innovation. There is a long tradition of literature
concerning customer value. Customer value basically consists of what
Ansoff’s (1987) matrix, based on the dimensions of market and product
newness, illustrates. Newness is a fairly troublesome concept, since it may
refer to products that are new-to-the-world (Booz et al., 1982), as well
as to major (Lovelock, 1984) or disruptive (Christensen, 1997) innovations.
Customer value can be seen as a new, innovative offer by a firm to its
customers. In general, we will draw the distinction between products or
services that are new-to-the-world, and new versions of existing products
or services (see also the concepts of versioning as used by Shapiro &
38 H. Bouwman, E. Faber, T. Haaker, B. Kijl, and M. De Reuver
Socio-emotional Instrumental
Human capability
Control
augmentation
Belonging Privacy
Generic services
Ubiquitous Ubiquitous
Personalisation
communications information
Presence
Natural interaction Context adaptation
awareness
on the one hand, and security and privacy concerns on the other. Several
surveys have identified personal information security and privacy as being
among the most pressing concerns when it comes to using new mobile
technologies (Haaker, Faber, et al., 2006; Klemettinen, 2007). At the same
time, several technologies have been made available to protect people’s
personal information and privacy. With some notable exceptions, very few
of these technologies have been successful in the marketplace. There are
several possible explanations for this dilemma. People may not be aware at
all of information security risks during certain transactions, and even in
situations with full information humans do not always behave rationally.
People may also assume that institutions and government organizations are
providing a secure platform for their actions (Acquisti & Grossklags,
2004).
Individualization of mobile services. Individualization makes assessing
needs and careful targeting crucially important for realizing the potential
of providing tailor-made mobile solutions. Market segmentation involves
dividing the market (of e.g. consumers) into groups with shared needs or
desires, requiring a separate marketing mix (Kotler, Armstrong, Saunders,
& Wong, 1996). This means a market segment is a relatively homogeneous
collection of prospective buyers. There are many variables on which
segmentation may be based, e.g. geographical characteristics, for instance
city versus rural area, demographic characteristics, including age,
psychographic variables for instance lifestyle, or behavioral characteristics
such as purchase behavior or frequency of use (Kotler et al.). Targeting
involves the selection of a market segment for which a service is created or
at which a service is aimed. Specific market segments may be targeted
based on market size, growth potential, fit with the intended value of the
service offering, and – as the bottom line – the ability to reach the segment
profitably. In the mobile consumer market, segments are often based on
lifestyle.
Research in adoption and use of mobile services. Literature regarding
the adoption of new technologies is dominated by (1) studies on the
Diffusion of Innovation (Rogers, 1995), and (2) studies on the Technology
Acceptance Model (TAM) (Davis, 1989), the modifications of TAM as
presented under the label Unified Theory of Acceptance and Use of
Technology (UTAUT) (Venkatesh, Morris, Davis & Davis, 2003). Many
studies have used the TAM concept to investigate the mobile domain (for
a recent overview, see López-Nicolás, Molina-Castillo, and Bouwman
(draft). Existing Diffusion of Innovation literature suggests that
innovations that are perceived by individuals as having greater relative
advantage, compatibility, trialability, observability, and less complexity,
will be adopted more rapidly (Rogers; Ilie, Van Slyke, Green, & Lou,
42 H. Bouwman, E. Faber, T. Haaker, B. Kijl, and M. De Reuver
Service Design
To estimate realistic levels for Tariff or Efforts, one may study the
existing tariffs or efforts regarding similar services, e.g. a first estimate of
a tariff for a news service may be the price of a single newspaper. The
effort concept can best be explored by making use of Rogers Diffusion of
Innovation concepts. According to Rogers (1995), there are five factors
that influence the adoption and use of an innovation: compatibility with
people’s daily contexts and the relative advantage of the innovation over
other products or services (both covered in concepts discussed above),
complexity (how easy the service is understood by the customer), visibility
of the advantages of the innovation, and testability of the innovation. The
last three factors are related to the concept of Effort. Ease-of-use is the
flip-side of effort. The easier to use a service the less effort one has to do.
The introduced concepts in the service domain and their relations are
mapped in Fig. 2.3.
Service domain
Customers,
co-determines
Context End-users
Bundling
Technological co-determine
Delivered Value
Functionalities
co-determine Value Activities
T O
Technology Design
The service design and the generic issues we discussed above, more or less
serve as a guide to the technical design. The most important technology
design variables, and some of their relevant characteristics are:
Applications
Devices
produce Delivered
Billing Value
S
Platform
Service
Platforms Customer
puts
Data Platform requirements on
delivers
Access
Networks
Backbone
deliver
Infrastructure
Technical
Functionality
resources and capabilities that are required for developing and offering the
service to the market, and to develop a viable business model for involved
actors. In their analysis of business models, Hedman and Kalling (2003)
conclude that the bottom line is that economic value is determined by a
firm’s ability to trade and absorb ICT-resources and capabilities, to align
(and embed) them with other resources and capabilities, to diffuse them
in activities and manage the activities in a such way as to creates a
proposition at uniquely low costs or with unique qualities in relation to the
industry in which the company is operating. Collaboration, in-sourcing and
network formation are possible strategies for obtaining the necessary
resources an organization does not have.
In traditional strategic analysis, like specifically theories on Industrial
Organization (Porter, 1985, 1990; Porter & Millar, 1985), and the strategy
process perspective (Henderson & Venkatraman, 1993; Mintzberg, 1983;
Scott Morton, 1990), strategic, economic positioning in an industry sector
plays an important role. These approaches are atomistic in nature, focusing
on autonomous firms that create competitive advantage in specific
markets. Starting from strategy theory, these authors conclude that strategy
has to deal with industry, industry position, customer segment, geo-
graphical markets, product range, structure, culture, and position in value
chain. Value chain analyses have gained popularity through the writings of
Porter (1985), and have since evolved to include a wide variety of models.
Although the original purpose of a value chain was to identify the
fundamental value-creating processes involved in creating a product or
service within a firm, the concept has since been broadened and is often
used to describe an entire industry. An industry-level value chain serves as
a model of the industry, whereby the processes are considered independent
of the firms that may or may not engage in them. This separation makes it
possible to analyze the positions of various firms in the overall industry,
as well as instances of vertical integration or cooperative agreements
(alliances, joint ventures, et cetera).
Despite the strengths of the value chain approach, it has been criticized
from two perspectives. To begin with, its external focus has been criticized
by Barney (1991). In his resource-based view, Barney is more internally
focuses, i.e. on the resources and capabilities a firm controls and that enable
that firm to offer a compelling strategic advantage compared to others. The
core assumption of the Resource-based View of the firm is that competitive
advantage of a firm is derived from the resources and capabilities the firm
controls that are valuable, rare, imperfectly imitable and not substitutable
(Barney, 1991, 2001). A resource can be defined very broadly to include
almost anything in an organizational or inter-organizational setting. This is
clearly visible in some of the most widely used definitions of the term
Chapter 2 Conceptualizing the STOF Model 51
customer value (based on Grönroos, 1994). On the other hand, there are
costs associated with every service. Companies can decide whether they
support the entire customer process, or only one or a few stages in the
entire process. Their decision depends on what their core competencies are
(based on their resources and capabilities) (Petrovic & Kittl, 2003). Since
we assume that many services are provided by value networks, this
decision is the basis for the configuration of value webs. Each company in
the web will choose which value (and ultimately which part of the end-
user value) it will offer, or in other words, which part(s) of the customer
process it wants to support. In short, the values and cost are determined by
various organizations performing roles that contribute to the value that is
provided to the customer in the form of the e-service.
The following characteristics distinguish, according to Petrovic and
Kittl (2003) a value net and determine its advantage compared to
traditional businesses:
creating the business model. If the assets they provide are substituted,
the intended value and the business model could remain intact.
• Support or tier-3 partners. They provide generic goods and services to
the value web, without which the value web would not be viable, but
which otherwise could be used in connection with a wide variety of
intended customer value and business models.
Organization Design
• Actors can have greater or lesser degrees of power within in the value
network, depending on the resources and capabilities they bring to the
table. As we have seen, Hawkins (2002) identifies three basic types of
partners in a value network: structural partners, contributing partners
and supporting partners. In principle, structural partners are in a better
position to exert control over the network than supporting partners are.
Actors can fulfill single or multiple Roles, such as investor roles,
governance body or technology provider.
• Value Network. The number of actors and the frequency and type of
interactions contributes to the complexity and density of the value
network.
• Interactions and Relations. Relations may evolve from reciprocal
interactions. Relationships are important to a value network, because
they contribute to trust and commitment within the network.
Multiplexity refers to the number of levels within a relationship: the
greater the number of levels, the stronger the relationship.
• Strategies and Goals. Actors vary with respect to the strategy and goals
they pursue with the collaboration. Collaboration requires partners to
share information and provide insight into each other’s ways of
working. However, strategic interest may induce partners to act against
what is agreed upon, hide the truth or try to extract confidential
information from their collaboration partners. Organizations may defend
themselves by drawing up legal contracts and strictly monitoring
another partner’s activities. However, these safeguards do not guarantee
that partners will not act opportunistically, which means that trust
between partners is an important condition for an open and constructive
collaboration.
• Organizational Arrangements. Collaboration leads to complex
interdependencies between organizations, because no single partner
has formal authority over another partner. Every adjustment has to be
discussed and jointly agreed (Klein-Woolthuis, 1999). To govern the
collaboration, actors need to agree formally and informally on how to
Chapter 2 Conceptualizing the STOF Model 57
Organisation domain
Actors Interactions
is a have
generate
puts requirements
on
Technical Investment Delivered
Costs
Architecture Sources Value
T F F S
Finance Design
• Investment sources. The investments and costs are closely related to the
design choices made in the technology design. However, the question as
to who will supply Capital is another important design variable in the
finance domain.
• Cost sources. The costs may also be influenced by the coordination
costs of the value network.
• Performance indicators. With regard to the evaluation and management
of the financial arrangements over time, performance indicators, like
market adoption, usage, return on investment, et cetera, are necessary.
• Revenue sources. Revenues can come directly from the end-user, but
there may also be other sources of revenue (for example subscription,
advertisement or government subsidy).
• Risk sources. The risks that may exist in the other domains have
financial consequences. For example, if the perceived customer value is
much lower than the assumed value, this may have a negative impact on
Chapter 2 Conceptualizing the STOF Model 63
the revenues. The way the value network copes with the financial
consequences of the various risks is part of the financial arrangements.
Scenarios for investments, costs and revenues may be used to counter
future risk and uncertainty.
• Pricing. The price and the pricing structure is the most visible part of
the arrangements as far as the end-user is concerned. Possible solutions
are dependent on pre-pay or subscription based pricing, flat free charge,
or per usage pricing.
• Financial arrangements. The financial arrangements between the actors
in the value network describe the way profits, investments, costs, risks
and revenues are shared among the actors. These agreements should
clearly define the benefits for all actors involved.
Finance domain
monitored
using
Delivered is a Revenue Revenues
Value Sources generate are divided among
S
actors according to
threaten
co-determines
Based on the analysis of the four domains and the specific issues
discussed for the four domains, it is possible to analyze and design
business models. However, we believe that business models, are not a one
time result, but change all the time, and are dynamic in nature.
64 H. Bouwman, E. Faber, T. Haaker, B. Kijl, and M. De Reuver
they are qualified, and a high-level business model and the amount of
money needed.
• Phase II – alpha offering (building while planning): in this phase, the
objectives are to build the alpha version of the product/service and its
platform, see how it works, factor in changes and refinements to the
basic specifications, and understand and resolve implications for the
venture’s positioning, its business model, value propositions, as well as
the effects on functional strategies and plans of the rest of the venture’s
departments.
• Phase III – beta offering (testing the concept): in this phase, the
objectives are to test and refine the product or service and (by
implication) the rest of the venture’s program, gain early market
acceptance and customer testimonials from a beta product, and to use
beta stage results to secure funding to do a full market launch. Testing
the business model thoroughly is an important key skill in this phase.
• Phase IV – market offering (calibrating and expanding): the objectives
of this phase are to find customers, become profitable, and get the next
version of the offering to market.
• The emerging or fluid phase: in this phase, (many) new entrants as well
as incumbent players choose their profit sites and value network
positions. There is competition between new and old technologies and
between different designs using new technology. Product quality is low,
costs and prices are high, market penetration is low, with mostly lead
users and high-income users as customers. Since product/service and
market requirements are still ambiguous in nature, there are few failures
in this phase.
• The growth or transitional phase: in this phase, a standard or dominant
design defines a critical point in the life cycle of the innovation. The
customer base moves to a mass market. Competition and disappearing
ambiguity with regard to requirements force many firms to exit or make
important changes to their business models. The firms with the best
adapted, and the most viable and feasible business models survive.
Chapter 2 Conceptualizing the STOF Model 67
The results from the literature review of business models, value networks,
phasing and dynamics come together in our dynamic STOF model
as depicted in Fig. 2.7, which links the four STOF business model
components, the external forces, and the three phases we identified.
S S S
T F T F T F
O O O
Now that we have a clear idea of the three core phases of a business
model development path, we can take a look at the causalities between
phases, external forces and business model components. The impact of
external drivers on internal business model components will be different in
each phase. In the Technology/R&D phase, technology will be the major
driver behind new business model development. Specifically, the emergence
of new mobile, wireless and data networks, like the Internet, help to increase
the reach of businesses, while at the same time middleware, web services
and multimedia applications offer new opportunities for enriched,
customized and secure communication. However, new business models can
also be driven by market developments, such as changing customer demand
or new entrants on the market, or by regulatory changes, such as
liberalization or changes in, for instance, interconnection regimes that allow
for kick back fees. With regard to the service concept, technical and
organizational arrangements, as well as finance a large number of issues as
discussed before have to be dealt with in this first phase.
In the Implementation/Roll-out phase, regulators and competitors
become aware of the new product and services, and they will look into
possible regulatory implications and prepare a strategic response, for
instance by demanding stricter regulations. As a result, it has to be certain
that the service complies with regulation regarding such issues as fair
70 H. Bouwman, E. Faber, T. Haaker, B. Kijl, and M. De Reuver
In this chapter we will make the transition towards the design of business
models and the related critical issues. We develop a model that helps us
understand the causalities that play a role in understanding the viability
and feasibility of the business models, i.e. long-term profitability and
market adoption. We argue that designing viable business models requires
balancing the requirements and interests of the actors involved, within and
between the various business model domains. Requirements in the service
domain guide the design choices in the technology domain, which in turn
affect network formation and the financial arrangements. It is important to
understand the Critical Design Issues (CDIs) involved in business models
and their interdependencies. In this chapter, we present the Critical Design
Issues involved in designing mobile service business models, and
demonstrate how they are linked to the Critical Success Factors (CSFs)
with regard to business model viability. This results in a causal model for
understanding business model viability, as well as providing grounding for
the business model design approach outlined in Chap. 5.
Based on the theoretical and the core technological issues discussed so far,
we derived the first part of our STOF model, i.e. descriptive models for the
service, technology, and organization and finance domains respectively, in
Chap. 2. These models contain the most important design variables in each
domain. We use the term ‘design variable’ to denote that our model
focuses on variables that can be influenced by design teams, business
developers and managers.
72 H. Bouwman, E. Faber, E. Fielt, T. Haaker, and M. De Reuver
A central element in our model is the fact that a viable business model
should create value for customer and network alike. Creating customer
value is not an easy task due to the difficulty of extracting user
requirements, conflicting design requirements and a lack of the resources
needed to provide perfect solutions. Although design choices in the
technology domain should in principle satisfy the design requirements of
the service domain, not every solution will be affordable, which means that
there are also interdependencies between the technical domain and the
financial domain.
Creating value for business actors (network value) is complex due to the
conflicting strategic interests of partner organizations. Actors often
originate from different industries (e.g. network operators, financial
institutions and retailers), and each have their own strategic interests (e.g.
generate traffic, extend services to customers, generate transactions).
Design choices in the organization and finance domains may serve the
strategic interests of the actors involved.
In the business model literature, knowledge on how effectively balance
the requirements and strategic interests within and between the different
domains is largely missing. To develop insight into how organizations can
design ‘balanced’ business models, designers need to understand the critical
design issues (CDIs) in business models and their interdependencies. A CDI
is defined as a design variable that is perceived to be (by practitioner and/or
researcher) of eminent importance to the viability and sustainability of the
business model under study.
To elaborate our approach towards the design of viable business models,
we present the CDIs for mobile services’ business models in the next
section.
We have identified the common and recurrent CDIs from a large number
of case studies involving the business models of mobile services. The
descriptive STOF model we discussed in Chap. 2 has been used to describe
and analyze the business models of a number of cases, including mobile
entertainment services, mobile tracking and tracing services, (mobile)
community services, presence and instant messaging services, business to
employee services and mobile payment services (see Table 3.1).
Chapter 3 STOF Model: Critical Design Issues and Critical Success Factors 73
The aim of the case studies was to identify CDIs. Based on the case
study descriptions (see Table 3.1 for more extensive publications on
individual cases), specific CDIs were extracted for every domain, and then
clustered systematically. Based on the recurrence of issues and/or their
perceived relevance with regard to the viability of the business model, as
indicated by the interviewees and coded as such, these issues were
qualified as critical.
We will discuss the CDIs in more detail, establishing what the CDIs in
each domain are, and how they relate to balanced business models. Next,
knowledge on CDIs is used to build causal models describing the
interrelatedness of design issues and their relationship with business model
viability (see also Haaker, Faber, & Bouwman, 2006).
CDIs that originate from the service domain based on the cases analyzed are
Targeting, Creating Value Elements, Branding and Customer Retention.
bundling it with an existing product, which carries either the same brand
name or a different brand name. The TMC4U traffic information service,
for example, was promoted and sponsored by a manufacturer of Travel
Management Channel (TMC) modules, although it did not carry the
sponsor’s name. In the case of Radio 538 ring tones, the popular Radio
538 brand was explicitly linked to the service to increase service
awareness and communicate service image. An important requirement for
brand choice is brand recognition by the target group and the existence of
a match with the intended value proposition.
• Customer Retention. In addition to choosing a target group and defining
the added value, customer retention was found to be a CDI. Customer
retention refers to marketing strategies aimed to keep customers satisfied
and loyal with the product or service. The cases show that service
providers adopt different strategies to stimulate recurrent usage of their
services. In the entertainment cases, versioning, service bundling and
personalization were used to promote customer retention. Personalization,
accuracy and actuality of information were used in the tracking and
tracing cases to attract and retain users. In the cases involving presence
and instant messaging services, the strategy was to introduce new
versions with new functionality. Finally, in the business to employee
service Caremore, customization of the service was used to enhance the
service’s value for the employee to stimulate loyalty to the service.
The extracted CDIs and related design requirements are summarized in
Table 3.2.
Table 3.2. Critical Design Issues and related design requirements (service domain)
Critical design issue Description Balance of requirements
Targeting How to define the target Generic vs. niche service
group? B2C vs. B2B service
Creating value How to create value for the Technological possibilities
elements targeted users of the service? vs. user needs and wishes
Branding How to promote/brand the Operator vs. content brand
service?
Customer retention How to stimulate recurrent Customer lock-in vs.
usage of service? customer annoyance
Based on our case studies, CDIs that originate from the technology domain
are Security, Quality of Service, System Integration, Accessibility for
Customers, and Management of User Profiles.
76 H. Bouwman, E. Faber, E. Fielt, T. Haaker, and M. De Reuver
generally accepted standard for the GIS was available at that time. In
principle, the use of open standards and architectures allows for easier
integration between systems.
• Accessibility for Customers. The accessibility of the service to the target
group is obviously influenced by the choice of platforms, devices and
architecture. For example, a closed architecture reserves service access
to a restricted target group. This may be intentional, for instance in the
case of business to employee services and enterprise instant messaging
services, or in the case of mobile entertainment services offered
exclusively by an operator to its customers. However, a service may be
unavailable unintentionally when a service requires specific resources
(compliant handset) or capabilities (coping with cumbersome user
interface) from the end-user. For example, the TMC4U service requires
a specific TMC module. Users can only access the service if they invest
in such a module coupled to their car radio. Adoption of the Caremore
service required substantial training of personnel in order to be able to
cope with the mobile device. Similarly, the adoption of the P-Info
service (a mobile data service for police officers) was hindered because
officers had a strong preference for voice interfaces and access to
critical databases was not realized.
• Management of User Profiles. With regard to the personalization of a
service, a user profile that contains user interests, preferences and
behavior must be created and maintained. The management of this
profile, i.e. the creation, use, maintenance and access to the profile,
requires technical functionality that may be realized in different ways.
There has to be a balance between user involvement and automatic
profile generation, and between privacy and access to the user’s profile.
For MSN Messenger the instant messenger server keeps a profile for
each user. A privacy statement is issued to users regarding the
protection of the data they provide. In the case of the Traphic SMS-alert
service, the user controls his profile, containing times and routes of
travel, via Internet. In the i-mode Finder case, the necessary location
information is determined automatically by the operator and transferred
anonymously to the location-based service provider, after the user has
given his consent.
Table 3.3. Critical Design Issues and related design requirements (technology
domain)
Critical design issue Description Balance of
requirements
Security How to arrange secure access Ease of use vs. abuse
and communication? and privacy
Quality of service How to provide for the desired Quality vs. costs
level of quality?
System integration How to integrate new services Flexibility vs. costs
with existing systems?
Accessibility for How to realize technical Open vs. closed
customers accessibility to the service for system
the target group?
Management of user How to manage and maintain User involvement vs.
profiles user profiles? automatic generation
Based on our case analyses, CDIs that originate from the organization
domain are Partner Selection, Network Openness, Network Governance,
and Network Complexity.
Table 3.4. Critical Design Issues and related strategic interests (organization
domain)
Critical design issue Description Strategic interests
Partner selection How are partners selected? Access to critical resources
and capabilities
Network openness Who is allowed to join the Desired exclusiveness,
value network? control, and customer reach
of service
Network governance How is the value network Customer ownership and
orchestrated? Who is the control over capabilities
dominant actor? and resources
Network complexity How to manage increasing Controllability of value
number of relations with network and access to
actors in a value network? resources and capabilities
CDIs that originate from the finance domain are Pricing, Division of
Investments, Division of Costs and Revenues, and Valuation of
Contributions and Benefits.
• Pricing. With regard to the adoption and actual use of a service, the
perceived customer value must at least equal, and preferably exceed, the
price of a service. In Mobile Payment case examples, the service is free
of charge and even entitles user to reduced prices for purchased goods.
The aim is to attract and retain customers. The traffic information
Chapter 3 STOF Model: Critical Design Issues and Critical Success Factors 81
service TMC4U offers traffic messages via the RDS channel on car
radios. It is free of charge. However, to appreciate this service as a truly
personalized service, the driver needs to invest in a car navigation
system equipped with a TMC module. The service is sponsored by a
provider of navigation systems and TMC modules. The user of Traffic
SMS alerts pays a premium SMS price. The service is characterized by
relatively high variable costs and virtually no fixed costs for end-users.
The i-mode services (Mybabes, Radio 538 ringtones, Finder) use
identical pricing mechanisms: they require users to invest in an i-mode
phone, operator subscription, i-mode subscription, flat fee service
subscription and fees depending on data traffic. The height of the fees,
including those for the services offered by third parties, is set by the
dominant actor, in this case the operator. Pricing seems to be above all
aligned with the aims of the (dominant actor in the) value network, e.g.
it is aimed at maximizing profits or creating market share.
• Division of Investments and Risks. There are financial risks involved in
developing and introducing a new service, as there is uncertainty about
the resulting return on the investment. In the case of Caremore, a
business to employee service for homecare professionals, some of the
uncertainty was reduced by adopting a phased approach. Prior to the
actual roll-out of the service, it was tested in pilot groups. Traffic
information services like TMC4U and Traphic SMS alerts rely on the
government to make large investments in infrastructure for acquiring
and processing raw traffic data. In the mobile entertainment cases (My
babes, Radio 538 ringtones), the content providers are responsible for
the investments needed to provide content in a format that is acceptable
for the operator. Nordic operator Telia introduced a location-based game
(Botfighter), which was targeted at the youth segment. Telia regarded
the investments in the game as a means to win the (long term) loyalty of
the youth. However, to reduce the upfront investment Telia did not
develop the game itself. This was done by It’s Alive!, which in return
receives a monthly fee plus a share from the SMS revenues. The
division of investments seems to match partners’ profitability and risk
profile.
• Valuation of Contributions and Benefits. For fair and viable revenue
sharing arrangements it is important to value the contribution of each
partner to the service offering and the (intangible) benefits each partner
receives. In the Caremore case, for example, the choice in favor of a
specific operator was based on an existing trust relationship, and on the
quality of network coverage. In the same case the appreciation of the
system integrator changed over time. When the health organization
providing Caremore acquired the necessary competences for system
82 H. Bouwman, E. Faber, E. Fielt, T. Haaker, and M. De Reuver
Table 3.5. Critical Design Issues and related strategic interests (finance domain)
Critical design issue Description Strategic interests
Pricing How to price the service for Realize network
end-users and customers? profitability Realize
market share
Division of How to divide the investments Match individual partners’
investments among business partners? profitability and risk
Valuation of How to measure and quantify Fair division of costs and
contributions and partners’ contributions and revenues
benefits (intangible) benefits?
Division of costs How to divide the cost and Balance between individual
and revenues revenues among business partners’ profitability and
partners? network profitability
what creates value from the point of view of the customer (Edvardsson
et al.) instead of the possibilities of the technology. The CDI Creating
Value Elements (service domain) enables a compelling value proposition.
Moreover, a compelling value proposition is determined by CDIs like
Branding (service domain) and Pricing (finance domain). Customers
perceive a brand as an important element of a value proposition, and it can
be used to differentiate the value proportion from those of competitors
(Kotler, 2000).
A second CSF is a Clearly Defined Target Group (service domain). This
enables the service provider to stay focused on the customers (Edvardsson
et al., 2006). Market segmentation is a compromise between the unrealistic
assumption that all customers are the same and the uneconomic assumption
that all customers can be treated as individuals (Kotler, 2000). This also
means that having a Compelling Value Proposition and a Clearly Defined
Target Group are interrelated. The CDI Clearly Defined Target Group
(service domain) deals with choices between consumer or business market
and between niche or mass market. The result is a clearly defined target
group. The possibilities regarding targeting are co-determined by the Access-
ibility for Customers (technology domain). Here we see that a CDI
originating from the technology domain can influence a CDI originating from
the service domain.
Unobtrusive Customer Retention (service domain) is also a CSF for
customer value. Although firms often strive for customer retention, this
can reduce customer value when obtrusive mechanisms are used.
Obtrusive mechanisms can hamper the ease-of-use (Davis, 1989) and
create negative experiences that frustrate users (Strauss, Schmidt, &
Schoeler, 2005). Therefore, the CDI Customer Retention (service domain)
should lead to unobtrusive mechanisms, the design of which can be
supported by User Profile Management (technology domain) that makes it
possible to personalize of the service.
While the previous three CSFs relate to the service domain, the fourth
CSF is related to the technology domain. An acceptable Quality of Service
delivery (technology domain) is required because, as far as services are
concerned, the quality of the service process (functional quality) is as
important as that of the service outcome (technical quality) (Grönroos,
1994). Because mobile services are delivered via technology, the CDIs that
are related to the technology domain should lead to an acceptable quality
level. The Quality of Service relates to the performance of the technological
architecture in delivering the functionality. The Security deals with the
access to the service and the security of communication and information
processing. The compatibility refers to the level of System Integration with
the existing technical infrastructure, and that between subsystems.
Chapter 3 STOF Model: Critical Design Issues and Critical Success Factors 85
To conclude, the CSFs for creating customer value are Clearly Defined
Target Group, Compelling Value Proposition, Unobtrusive Customer
Retention, and an Acceptable Quality of Service. It is assumed that high
scores on these success factors will result in a service that meets the user
expectations, i.e. a service that generates customer value (Fig. 3.1). A
service that generates customer value in the long run can be expected to
result in a viable business model.
Accessibility results in a
Clearly Defined
Targeting
for Customers co-determines Target Group
T S S
enable a
Compelling
Value
Value
Elements
S Proposition S
T F
Customer Viability of
Value S
business model
Acceptable
System should realize
Quality of
Integration T Service T
should Unobtrusive
User Profile supports Customer realize
Customer
Management Retention
T S Retention S
Fig. 3.1. Critical design issues and critical success factors relating to creating
customer value
Division of results in
Costs and
Revenues F Acceptable
Profitability
Pricing F
co-determines
F
co-determines
Network
Openness
O
Sustainable
Network contributes to
Network
Governance
O Strategy O
Network influences
Complexity
O
Acceptable
Partner determines
Division of
Selection
O Roles O
Fig. 3.2. Critical Design Issues and Critical Success Factors for network value
88 H. Bouwman, E. Faber, E. Fielt, T. Haaker, and M. De Reuver
Together, Figs. 3.1 and 3.2 form a causal model that explains the
viability of business models based on the assumption that a viable business
model should provide both customer and network value. In this causal
model, the CDIs are the instruments used by designers and managers to
influence business model feasibility and viability.
In Chap. 5, a process model for designing business models will be
presented.
Chapter 4 The Mobile Context Explored
they also enable new types of services, including navigation services that
provide driving directions or maps, and tracking and tracing services to
find the location of family members, friends or objects (Van De Kar,
2004).
Communication and messaging services. Mobile data services can
complement voice communication services. The most popular of these
services has been person-to-person SMS, i.e. short text messaging. While
initial expectations regarding this service were low, it has proven to be the
most successful service to date. More advanced messaging using pictures
and video data is made possible through MMS services. Currently, video
telephony services are being heavily promoted by 3G operators. The use of
mobile e-mail is also increasing, mainly via specialized devices like the
Blackberry. A potential disruptive innovation as far as SMS is concerned
is instant messaging or group messaging. Instant messaging is a solution
that has been adapted from the fixed Internet that uses presence
information. In contrast to SMS, users do not pay for every message they
send, but only for the data traffic they generate.
Entertainment services. Entertainment services include downloading
music, watching television, playing games, jokes, horoscopes, gambling,
and chatting. A special type of mobile entertainment services is mobile
TV. While entertainment is often developed by professional artists or news
agencies, there is a growing trend in user-generated content, driven by
camera-enabled phones for making pictures and videos. As a result, users
become active contributors and content developers rather than mere
passive consumers.
Transaction services. Another type of services is related to transactions
and payments. Mobile payments involve ‘wireless transactions of a
monetary value from one party to another using a mobile device […] over a
wireless network’ (Ondrus & Pigneur, 2005, p. 1). These could be micro-
payments, e.g., for transportation tickets or vending machines, or macro-
payments, e.g., for movie tickets, shopping or restaurants (Mallat, Rossi, &
Tuunainen, 2004). A related type of services is mobile banking, i.e.
accessing information on account balances and carrying out transactions
(Mallat et al., 2004). Mobile remittance services are particularly relevant
in developing countries because they make it possible to transfer money
between individuals in the absence of financial institutions (see Chap. 13).
Business services. In addition to consumers, businesses can also benefit
from using mobile services. Examples of business services include mobile
sales-force automation, mobile supply-chain management (SCM), mobile
access to email, Personal Information Management (PIM) applications,
mobile tracing and tracking, and mobile dispatching and scheduling
(Wang, 2007). Benefits associated with the adoption of these applications
94 M. De Reuver, H. Bouwman, and T. De Koning
Over the past 15 years, the wireless industry has witnessed a dramatic
technological evolution. Starting from analog, voice-only, circuit-switched
transmission, today’s networks provide high-speed, packet-switched,
digital voice and data services (Kumar, 2001). There are two types of
wireless access technologies. Cellular networks cover large areas up to the
size of countries. Other wireless access technologies, on the other hand,
often provide higher data rates but cover smaller areas. These short-range
technologies are typically used to cover smaller, densely populated areas,
such as city centers or university campuses. Larger coverage can be gained
Chapter 4 The Mobile Context Explored 95
Mobility
High speed
Vehicular (rural)
Pedestrian UMTS
Nomadic HSPA
EDGE
Fixed urban
WiMAX
Indoor DECT
WiFi
Personal Area Bluetooth
0.1 1 10 100 User data rate
Cellular Networks
When the first generation of cellular networks was deployed in the 1980s,
it provided analog voice telephony, and adoption rates were low. Cellular
96 M. De Reuver, H. Bouwman, and T. De Koning
2006) and allows operators to limit access to public Internet pages (Braet
& Ballon, 2007).
This technology eliminates the need for network components like base
stations and central controllers. As a result, ad hoc networks are typically
quicker and cheaper to deploy than centralized networks. In addition, they
are more flexible and theoretically more reliable, as there is no dependence
on a central network component. Disadvantages are the lack of standard
routing protocols, security issues and a reduced reliability when there are
fewer users.
There are various middleware and applications that enable mobile devices
to access the Internet. The first attempt to enable mobile Internet was
WAP, the purpose of which was to enable the easy and fast delivery of
relevant information and services to mobile users. Although WAP-based
browsers never met these expectations, the transport mechanism is still in
use (Jaokar & Fish, 2004). The central part of the WAP architecture is the
WAP gateway between the application server and the mobile device. The
gateway communicates with the application server using regular Hypertext
Transfer Protocol (HTTP) traffic. However, with the end-user client it
uses Wireless Mark-up Language (WML) to overcome the limitations
associated with HTTP on the wireless Internet (Jaokar & Fish). WAP can
also be used to push Internet content to end-users by using the WAP push
protocol, i.e. by including the link in an SMS message. The WAP protocol
has been the basis for i-mode, which is a proprietary technology designed
for browsing WAP sites on a mobile device.
An alternative to accessing applications on a remote server is to run
applications on the handset itself using Java 2 Micro edition (J2ME) or
Binary Runtime Environment for Wireless (BREW). Extended Hypertext
Markup Language (xHTML) mark-up is used for J2ME to adapt the
content to fit the screen of the device.
requestor can find the right provider for his needs by querying this broker.
Communication between service provider and requestor takes place via
asynchronous messages. Web services define a set of protocols that can be
used to implement SOA. The SOAP-standard (Simple Object Access
Protocol) is used to send messages between service requestors and
providers. The messages are built up using the XML protocol (Extensible
Markup Language). Web Service Description Language (WSDL) is the
standard being used to describe the services published by the service
provider. WSDL files are stored by the service broker using the UDDI
protocol (Universal Description, Discovery and Integration). All these
standards are open, meaning that any service provider and requestor can
use web services to establish mutual interaction. The standards also
‘shield’ the internal complexity of the application hosted by the service
provider, simplifying communication between providers and requestors,
and guaranteeing interoperability between their systems. Because it is
fairly easy for service requestors to switch to other services provided by
other providers, web services are very flexible. Another advantage is that
services offered by providers are reusable, i.e. a service offering’s generic
functionality that is usable for multiple end-user services can be used over
and again in many service compositions.
As mobile communication networks increasingly offer high speed data
communication, a logical next step would be at least to consider applying
web services technology to mobile devices. This approach is known as
mobile web services (MWS) (Farley & Capp, 2005). There are many
benefits associated with MWS compared to the way service development
and execution currently take place. Because MWS uses open standards, it is
much easier to develop new services, and it is easier to reuse services
(Farley & Capp, 2005), the latter of which is especially relevant to generic
service components that can be integrated into other services, such as authenti-
cation, billing and context information services. In addition, MWS will enable
dynamic service discovery and is expected to benefit the interoperability of
mobile devices (Pilioura, Tsalgatidou, & Hadjiefthymiades, 2003). Given
the many different mobile devices and the diversity of operating systems and
parsers, interoperability is currently not guaranteed, which leads to cost
inefficiencies. MWS is also expected to benefit end-users, as the ease of
developing services will probably lead to a greater variety and number of
services, a higher level of personalization, better and simpler user interfaces,
and the provisioning of services over the most appropriate access technology
(Farley & Capp, 2005).
To illustrate the potential of MWS, some applications can be
considered. A problem that MWS could solve is that users may have
multiple mobile devices such as phones, PDAs and laptops, and that the
100 M. De Reuver, H. Bouwman, and T. De Koning
user’s contacts are typically not stored in all of them. To solve this, the
contacts could be stored in a central database, and users can then access
the data via MWS (Farley & Capp, 2005). Another application of MWS is
to use the technology for providing generic service components, such as
geographical maps or authentication and billing services. Instead of having
to develop these components for various service offerings, service
providers can reuse and integrate them into their specific service offerings.
Generic authentication and payment services are in fact the main services
advocated in the MWS architecture proposed by Microsoft and Vodafone
(Microsoft, 2003). In addition to requesting (generic) services from the
outside world, MWS can also be used to enable external parties to request
information from the mobile device. For example, a context-aware
application offered by a service provider may request information about a
user’s location or current occupations. If standard web services published
by the user in a UDDI are used to this end, any service provider could, in
principle, easily add context awareness elements to his value proposition.
In a similar approach, services could request context data from portable
sensors, contact information, payment information or other personal
information from the user (Berger, McFaddin, Narayanaswami, &
Raghunath, 2003).
Although the benefits of MWS are clear in terms of flexibility, inter-
operability and reusability, there are also several challenges mentioned in
literature when it comes to applying web services in a mobile context. One
obvious difference between a mobile and a wireline device is the
portability and the mobility of the device, i.e. a mobile device can move to
another location. In addition to mobility, the personal nature of a mobile
device also differentiates MWS from fixed Internet web services. A mobile
device is generally owned by one person only, which makes it possible to
link the device to a specific user identity. This offers opportunities, for
example with regard to personalizing the MWS. However, it also raises
issues involving identity management and privacy that are more serious in
the mobile setting than they are in fixed web services (Farley & Capp,
2005).
We also identify a set of challenges related to the specific performance
limitations of both mobile devices and infrastructures. Although we agree
that some of these issues may become less urgent as technology advances,
MWS today have to be designed in such a way as to limit their use of
computation, memory and energy resources (Berger et al., 2003). Another
issue involved here is that the user interface with small screen and
keyboard makes it more difficult to fill in forms, which has an impact on
the usability of MWS (Farley & Capp, 2005). Also, because bandwidth is
still smaller and more expensive in mobile networks than it is in the fixed
Chapter 4 The Mobile Context Explored 101
Internet, limited data rates need to be taken into account. Issues regarding
bandwidth and processing power are especially challenging for MWS, as
web services use XML and SOAP protocols to code the messages.
Processing XML messages on mobile devices requires higher levels of
processing power compared to HTML messages (Limbu, Wah, & Yushi,
2004). In addition, XML messages generate a larger overhead than HTML
pages, as they can reach up to five times the size of content messages
(Tian, Voigt, Naumowicz, Ritter, & Schiller, 2004). In cases where
bandwidth is indeed limited, or where users are charged per packet of
transmitted data, this may well become a constraining issue.
Although standardized MWS architectures have not yet been defined,
industry parties like Microsoft and Vodafone (Microsoft, 2003) are
working together in developing a MWS architecture, as well as Nokia and
Sun (Nokia & Sun, 2004). The open Internet standardization body OMA
(Open Mobile Alliance) is also working on a standardized MWS
architecture. An important trade-off in these efforts involves the choice
between using open protocols to implement MWS or using proprietary
standards. Of course, using proprietary standards may well put inter-
operability at a risk, and may lead to walled garden alike business models.
4.3.3 Devices
While early mobile phones offered only voice calling and text messaging
functionalities, the current trend is towards multifunctional consumer
electronics devices. At the moment, high-end mobile devices offer
radio/music/video players and editors, Internet browsers, agenda functions,
voice recorders and cameras. In addition to offering GSM access, most
devices nowadays include Bluetooth and Infrared functionalities, and they
can increasingly access 3G and WiFi networks. While mobile phones are
taking over these traditionally separated consumer electronics functions,
there is also an opposite trend that involves MP3-players being equipped
with cellular communication functionality, e.g., Apple’s iPhone.
In parallel, processing power, data storage capacities, and screen
resolution have increased tremendously. Having said that, there are
considerable differences between high-end devices like Personal Digital
Assistants (PDAs) and smartphones on the one hand, and regular mobile
phones on he other. In terms of software, today’s devices are capable of
executing Java applications, browsing the Internet through specialized
mobile phone browsing software, and have specific operating systems, e.g.
Microsoft Windows Mobile and Symbian.
102 M. De Reuver, H. Bouwman, and T. De Koning
Actors providing mobile services can fulfill a variety of roles, and there is
no generic role division that applies to all services. In this paragraph, we
link the resources and capabilities needed to deliver mobile data services to
the typical roles suggested in the STOF model.
Network Roles
Hardware Roles
Software Roles
Content Roles
trend towards user-generated content, and users can to a certain extent take
over the role of the traditional content providers. However, content
developers are also developing new formats based on this trend.
A content provider is an actor providing and distributing content
(Grover & Saeed, 2003). Although content providers can create their own
content, they usually provide content obtained elsewhere. The UMTS
Forum (2002, p. 3) defines ‘content provider as a provider of services that
add value to access and transport services. Value-added services can be
produced by the content provider itself or purchased from others.’
While content developers and providers may focus specifically on mobile
services, for many organizations the mobile channel is just another channel
to distribute their content. For example, broadcasting organizations, traffic
information providers, banks and tourist information offices already provide
content services to customers using traditional channels like TV or the fixed
Internet.
Advertisers form a specific type of content providers, because they offer
sponsored content. They basically provide sponsored content to content
providers, aggregators and service providers, to be included in their
content services, for which the advertiser pays a fee. Advertisers can also
provide free (sponsored) services or content on their own. Advertisers can
be any actors willing to pay for the distribution of his brand name and
products and services. Advertising agencies will play an important role in
delivering and possibly adapting advertisements to the mobile devices.
Similar to the content providers, advertisers can focus specifically on the
mobile channel or extend their marketing mix with mobile advertising.
When content from a number of providers is combined in a single
service offering, a content aggregator is required. Generally speaking,
there are passive aggregators, who merely bundle the content, and active
aggregators, who carry out filtering, editing, or customization (Barnes,
2002; Li & Whalley, 2002).
As the amount of content on the mobile Internet is increasing, search
engines become more important. Search engine providers can help manage
content and the complexity of content. Often, actors from the fixed
Internet, such as Google or Yahoo!, play the role of search engine
provider.
As discussed in this chapter, many mobile Internet services are based on
portals: ‘a network site that aggregates, presents, navigates, and delivers a
wide range of Internet communication, commerce, and content services to a
large number of visitors.’ (Sabat, 2002, p. 522). The portal is a ‘gate’ to the
mobile Internet, as it is the first point of browsing (Kuo & Yu, 2006). Barnes
(2002) places the portal under ‘market making’, as the portal is aimed
primarily at marketing and selling content, including program development,
Chapter 4 The Mobile Context Explored 107
Walled Gardens
Open Models
In an open access model, users can access content from any provider
(Feijóo et al., 2006). Aside from optional agreements on billing and
authentication, there is no relationship between operator and content
providers. In an open access model, customers can access more diverse
content and content providers are not constrained by demands from the
operators (Forrester, 2006b). Competition between content providers and
greater freedom to experiment may lead to more innovative services. On
the other hand, operators may stop investing in innovative network and
middleware technologies if they are uncertain whether they can still recoup
a sufficient portion of the revenues. Also, a lack of central billing, security
and customer support may increase complexity for consumers (Forrester,
2006b).
Hybrid Models
There are several hybrid models for the coexistence of third party
providers and content services by the operator, (Feijóo et al., 2006). In
these models, operator and third party branded content are mixed. An
example of such a model is the i-mode ecosystem model, which offers
users official and unofficial sites that both use operator billing facilities,
i.e. a semi-walled garden model that allows users to browse and optionally
download content off-portal from a set of exclusively approved partners
(OVUM, 2006). In this model, operators only provide connectivity and
billing, and do not control the content provider using its billing services.
Nevertheless, operators impose certain conditions on content providers, for
instance a maximum content fee for end-users. A related model is the one
Chapter 4 The Mobile Context Explored 109
used by Orange’s Gallery WAP site, which provides access to other WAP
sites to users from any network (OVUM).
Depending on the intended offering, a diverse range of resources and
capabilities is required to provide mobile services. Actors who play roles
relating to content, software, hardware and networks, have to work
together to make the business model work. While governance mechanisms
have traditionally relied on operators organizing the activities in a walled
garden model, technological and strategic developments have put this
position under pressure. As a result, the industry is shifting from closed
models of collaboration towards more open models that allow flexible
collaboration between content providers, application providers and
operators.
equipment, the installation of base stations and site engineering. While the
costs of rolling out a cellular network are typically high, for short-range
technologies such as WiFi the investment costs may be lower. Once a
network has been rolled out, the marginal costs of adding users or content
services is low. This explains the wholesale strategies of operators, in
which excess network capacity is sold to virtual network operators of
content providers. With regard to operators, operational costs involve
leasing the site where base stations are installed, interconnection and
roaming fees, electricity consumption, backhaul transmission, and
operation and maintenance (Rendón, Kuhlmann, & Aranis, 2007). In
addition, non-network related operational costs include service support,
marketing and promotion, billing, bad debt and fraud, subsidies on
handsets and customer care.
Revenues are typically collected by the operator who has a billing
relationship with the end-user. To divide the revenues, a revenue share
model is often used. For example, in the i-mode model the operator shares
84% of the revenues with its content providers. When using SMS-based
charging for WAP services, the revenue share or kick-back fee may be
reduced to 50%. In some cases, operators buy content from content
providers in order to sell the content via the portal. Mostly, the operator
pays a fixed fee to the content provider for this. Application providers
often charge a fixed project development fee to content providers and
operators for the development of the application, in addition to a monthly
fee for support and maintenance.
End-users typically pay for two service components: the use of the radio
network resources (i.e. connectivity) and the value of content services
delivered over that network (i.e. content). For connectivity charging, many
models are being used, e.g., metered charging, packet charging, expected
capacity charging, edge pricing, paris-metro charging, and market-based
reservation charging (Cushnie, Hutchison, & Oliver, 2000). Basically, these
models can be divided into fixed and packet-based charging. Fixed or flat
fee charging is based on a fixed fee regardless of the actual traffic on the
network, while packet-based charging is based on the amount of traffic
generated or time spent online. While packet metering used to be the
dominant way of charging for network resource usage, flat fees are
beginning to enter the market. The amounts charged for network resource
usage vary. The highest tariffs are found in Japan and Germany, followed by
the USA, and they are lowest in South Korea, Denmark and Finland (TNO,
Chapter 4 The Mobile Context Explored 111
2006). Generally speaking, the average revenues per user (ARPU) are
decreasing, especially when it comes to services (Roland Berger, 2005). A
large proportion of these revenues is still related to voice services, while data
ARPU currently comes mainly from plain SMS services rather than from
advanced mobile data services (Forrester, 2006b).
While customers are commonly used to paying for connectivity, they
are less used to paying for content, because on the fixed Internet content is
often free. For content charging, various models are in use, e.g., pay-per-
download, subscription based, event based, context pricing, personal
pricing and value-based pricing. In terms of technology, various models
are used for content charging, such as premium-SMS and WAP billing.
Other models for generating revenues, such as advertising and sponsoring,
are increasingly considered.
Generally speaking, there are two types of tariff schemes. In post-paid
billing, users generally pay a fixed fee per month as well as a fee for
calling and data traffic. Often, users get their device for free with the
subscription, through subsidization by the operator. In the case of prepaid
billing, users pay in advance and calls and data traffic are credited against
the prepaid balance. This scheme is especially common at the lower end of
the market. While prepaid and post-paid tariffs used to be strictly separated
in the past, they are currently converging, because users may want to pay
for some services through a pre-paid system (e.g. content downloads),
while they want to be charged for more predictable costs (e.g. monthly
contract or voice calls) via a post-paid billing system (AtosOrigin, 2006).
Generating revenues with mobile services is challenging, as customers
are not used to paying for content services on the fixed Internet. The
industry is trying to solve this through flat fee models for network resource
usage, and a mix of flat fee, fee per usage and free, advertisement based
models for content services. Typically, revenues are collected by operators
that have the billing relation with the end-user, and are divided among
content providers through revenue share models.
Thus far, in this chapter we have illustrated the context in which mobile
services business models are developed, and how this context is different
from that of other e-services. While there are various largely accepted
classifications of fixed Internet business models (e.g., Rappa, 2000), their
applicability in the mobile domain is limited (Leem, Suh & Kim, 2004).
Several authors propose alternative mobile business model classifications
112 M. De Reuver, H. Bouwman, and T. De Koning
The STOF model describes the main concepts and design variables within
the four business model domains, i.e. service, technology, organization,
and finance (see Chap. 2). We have argued that the design choices that are
made in these domains need to be balanced to realize viability and
feasibility. To support a balanced design we introduced Critical Design
Issues (CDIs) and Critical Success Factors (CSFs), as well as the specific
issues regarding the business models of mobile services (see Chaps. 3 and
4). In this chapter, we introduce the STOF method, using a step-by-step
approach to create a business model design for a specific service concept
(Bouwman, Haaker, & De Vos, 2005; Bouwman, Haaker, Steen, & De
Vos, 2003; Haaker, Oerlemans, Steen, & De Vos, 2004). The STOF
method explicitly helps designers to create viable, feasible and robust
business models that create value for customers and providers alike.
The method is especially useful in the early stages of service
innovations: the exploration and initial elaboration of various ideas and
options. When the method is used at an early stage, the service and
technology design can be adjusted to satisfy the business requirements and
increase market potential at a later stage.1
The STOF method consists of four steps. In the first step – the Quick
Scan – an initial sketch of the business model is made. This basically
means a description of the service and the intended value proposition, a
value network, a technical architecture and a financial model. In the
second step – evaluation with CSFs – the viability of the Quick Scan result
is assessed. The initial business model is refined in step three, by
specifying the CDIs. A robustness check is carried out in step four. These
steps will be further explained in the next sections.
1To facilitate the use of STOF method, a handbook is available via http://www.
stofmethod.com, providing templates for the design of business models using the four-
step method. It can be adjusted to suit the specific needs and issues of a design session
and is available in Dutch as well as English.
116 H. De Vos and T. Haaker
Illustrative Example
The STOF method consists of four subsequent steps, illustrated in Fig. 5.1.
The input that is required is an initial new service idea or service concept.
Step 1 refers to the Quick Scan, in which specific design variables of
the four domains are examined and initial design choices are formulated
for the service idea under investigation. Answers to basic questions
regarding the service concept, the technological architecture, and the
organizational and financial arrangements, yield a broad outline of the
business model. The business model concepts considered in the Quick
Scan are related to the domain models of Chap. 2.
Chapter 5 The STOF Method 117
Service
Technology
Basic Quick Scan Organization
Step 1
questions Finance
no
OK? STOP
improve yes
In step 2, this outline is evaluated on the basis of the eight CSFs (see
Chap. 3), with the aim of assessing the expected viability of the business
model. One example of such a critical success factor is the extent to which
the proposed value proposition appeals to the target group. The evaluation
helps to determine which parts of the business model have to be modified.
Alternatively the business model is fine and further specification is not
necessary, or the evaluation step shows that no viability can be achieved
and the design process is stopped.
If there are doubts with regard to certain criteria, specific elements of
the business model are reexamined or further specified in step 3. Here, the
relevant basic information provided by the Quick Scan is worked out in
greater detail and the business model is refined using the CDIs that were
introduced in Chap. 3. The CDIs are related to design choices that have a
strong influence on the assessment of the CSFs. These choices typically
demand a careful balancing of the requirements and/or the interests of the
various parties involved. The design issue Personalization, for instance,
not only affects the attractiveness of the value proposition, it also has an
impact on the costs of the service and on the requirements concerning the
management of user profiles. Both refining the elements of the business
118 H. De Vos and T. Haaker
Service Design
The Quick Scan starts by outlining the value proposition from the point of
view of the customers and/or end-users. We need to keep in mind that the
customer of a service, i.e., the one paying for the service, is not necessarily
also the user of the service. The main issue with regard to the service
Chapter 5 The STOF Method 119
design is, therefore, ‘What is the service concept, and what is the added
value for the customer and/or user?’
To answer this question, service design focuses on the following set of
design variables (cf. Chap. 2): Intended Value of the service, Customer and
End-user, Context of use, service Tariff and Effort. Typical questions that
need to be answered are ‘Who is the customer, who is the user?’, ‘What is
the specific service? Why would someone want to use it?’, ‘What is the
context of use?’, ‘Are there alternative products or services?’ and ‘What
would customers be prepared to pay?’ The result is a clear description of
the service, its target customers and the intended added value for these
customers, sometimes illustrated by a ‘walk through’ (see Fig. 5.2). Based
on these results, requirements and restrictions with regard to the
technology, organization and finance domains can be identified.
The ideas, assumptions and requirements that are addressed in the
service domain serve as a starting point for the other domains. It is our
experience that, when addressing other domains, it is often necessary to
reconsider design choices that have been made in the service domain.
GPS
What shall we do? To the left you see
an ancient Hunebed
This is exiting!
Let’s get into the car.
Fig. 5.2. Service design walk through for the Hunebed case
Technology Design
The technology that will be used in the Hunebed case has been roughly
defined in the service domain, since it is very much a part of the value
proposition. A decision is made to use PDA’s. As far as the intended target
group is concerned, it is important that the application be easy to use, and
the content and symbols should be clearly legible. A low-cost solution is
selected, with all the content stored on the PDA and periodically updated
by the Tourist Board with aggregated information based on the content of
several content providers. According to the service design, all information
is stored on the PDA, which means mobile connectivity is not required.
Obviously, this is a very important design choice. If real-time data transfer
was required, the technology, organization and finance design would be
quite different. The solution would become much more expensive. Instead,
all the maps, content and software are stored on the PDA, and can be
periodically updated.
Since most customers travel in pairs, a PDA with built-in speakers
makes it possible for both persons to listen to the audio. The information is
linked to the customers’ location. A GPS module is used to determine their
location. A possible technical architecture is presented in Fig. 5.3. The
application can be easily modified for use in other regions, simply by
changing the content.
Application
Content Aggregator
Content
manager
Content providers
Hunebed Add
museum provider
Organization Design
After defining the service concept, the value proposition and the
technological infrastructure, the organizations that have to be involved in
delivering this service concept can be selected. In most cases, multiple
parties are needed, since mobile services require access to complementary
assets provided by various organizations. For a co-operation to be
sustainable, every organization must benefit, either in tangible or in
intangible terms. Furthermore, the goals and interests of the partners must
be aligned, and not clash. Following the core variables of the STOF model
(see Chap. 2), the organizational design focuses on the Activities that
combine into roles, the actors that have the required Resources and
Capabilities to play these roles, and the Organizational Arrangements.
To begin with, a list of roles can be drawn up with regard to the
activities and resources needed to deliver the service. Each role can be
characterized by the output it provides in terms of service, product and
value. The roles, together with the value exchanges between them,
determine the Value Network of the service. The exchanges that take place
may be of a tangible (providing devices or content) or intangible nature
(providing financial or marketing-related expertise). Each role has specific
responsibilities and will deliver a specific resource or capability needed by
others. It is useful to identify the structural, integrative and the supporting,
facilitating roles in the value network. What specific roles the various
actors play will depend on their individual resources, capabilities and
strategic interests, and on the competitive environment. Often, multiple
value networks are possible, which differentiate with respect to the actors
that take on structural roles. The Quick Scan of the Organization domain
results in a preliminary design for the actors involved, the organizational
arrangements, and the value network structure, as well as a description of
the actors’ strategies, goals and value activities, and the resources and
capabilities they contribute.
In some business design sessions, defining the roles in the value
network design will be enough. In other sessions, it is useful to assign
specific actors, for example organizations or departments, to the various
roles. Because roles can often be assigned to different actors, in the end
this leads to several possible organizational arrangements.
Normally speaking, the Tourist Board would be the initiator of the service
as well as the central actor in the value network (see Fig. 5.4). Information
providers (or content providers) are needed to provide information
Chapter 5 The STOF Method 123
regarding regional points of interest. The Tourist Board takes care of the
physical distribution of the PDAs, the marketing and the aggregation of the
content. The Tourist Board takes care of customer contacts. To develop
and maintain the PDA applications, the services of an application
developer are used. A device provider will handle the supply and
maintenance of the PDAs. Finally, the Tourist Board has to negotiate
agreements with advertisers. The Tourist Board may cooperate with local
shops and tourist offices to ensure customers to be able to pick up and to
return the PDA’s at any address. Figure 5.4 provides an illustration of the
value network.
Application
developer
Application Distributor
Tourist Board
Content on
Content Content Content PDA Service
End user
provider aggregator provider Service and
distribution
Device
Advertiser
provider
Finance Design
The bottom line of the business model is addressed in the finance domain.
According to the STOF model, this involves the following design variables
(see Chap. 2): Revenues on the one side and Investments, Costs and Risks
on the other. The main issue is whether the service yields sufficient
revenues for all the parties involved to be compensated for their efforts,
costs and risks? First of all, the finance design outlines the revenue sources
and the cost-, investment and risk sources. Taking part in a value network
can have other, less tangible, benefits, in addition to monetary revenues,
for instance market expertise, access to a new technology or insight into
the business strategies of relevant business partners. With regard to the
viability of a business model, it is important to make sure that all the
parties involved somehow benefit, which means that finance design
124 H. De Vos and T. Haaker
End-users will pay the Tourist Board a fixed daily rate of € 6. This price is
set to match the price of the competitive paper guides. Making a profit is
not a target for the Tourist Board, in fact, breaking even is enough. In
addition, advertisers will pay the Tourist Board for placing their location-
based ads on the PDA and directing customers to interesting offerings
along the way. Finally, the Tourist Board settles the account with the
application developer and device provider. The content providers think it is
such a charming idea that they do not need to be paid. They feel that taking
part in this project will help their reputation and promote their brand. The
distribution of the revenues is shown in Fig. 5.5.
Application
developer
Application development
€200.000 Distributor
Fee €6
Tourist Board
Fee €6
Device
Advertiser
provider
Fig. 5.5. Revenue streams in the value network for the Hunebed case
Table 5.1. Hunebed case’s rough estimates of annual revenues, investments and
costs
Revenues
From usage, based on a € 6 fee per use and 15,000 customers € 90,000
Advertisements, based on 100 advertisers paying € 100 each € 10,000
Total revenues € 100,000
Investments
Development and maintenance application € 200,000
Exploitation costs
PDA lease, based on 100 PDA’s and € 200 fee per PDA € 20,000
Annual budget for marketing and communication € 10,000
TOTAL annual exploitation costs € 30,000
Annual result
Revenues € 100,000
Depreciation of investments (in 3 years) € 66,667–
Exploitation costs € 30,000–
Result € 3,333
After the Quick Scan has been carried out, there are four domain-related
designs that together make up the initial business model: a description of
the service and the intended value proposition, a value network, a technical
architecture and a financial model. It is likely that the requirements in the
four domains affect each other. Before moving on to the next stage –
evaluation – fine-tuning between the domains is relevant. Because the
Quick Scan design is relatively sketchy, this can be done in a quick,
relatively basic and qualitative way. Questions that drive the balancing
activities between domains are listed in Table 5.2.
126 H. De Vos and T. Haaker
The evaluation of the Quick Scan design looks at how well the business
model satisfies the CSFs for business model viability. The CSFs have to do
with creating value for end-users (customers) and service providers, as
discussed in Chap. 3. The evaluation is based on the causal models
presented in Chap. 3, which state that design choices with regard to the
CDIs have a strong influence on the CSFs, and thereby on business model
viability as well. Consequently, the CDIs are of the utmost importance to
business model designers and managers. By carefully specifying the CDIs
they can positively influence the CSFs and as a result the business model’s
viability.
The evaluation in step 2 focuses on the CSFs. The underlying logic is
that a negative assessment of certain CSFs implies that there will be
bottlenecks in the business model’s viability, and that CDIs related to such
CSFs should be redesigned. Table 5.3 provides an overview of the CSFs
and CDIs that should be reexamined when a CSF is evaluated negatively.
For an elaborate description of CSFs and CDIs, we refer to Chap. 3.
Chapter 5 The STOF Method 127
Table 5.3. Overview of the CSFs and their relationship to the CDIs
Critical Success Related critical design issues in the factors
Factors Service domain Technology Organization Finance
domain domain domain
Clearly defined Targeting, Accessibility to
target group creating value the target group
elements
Quality of Creating value Security,
the value elements, management of
proposition branding, user profiles,
customer accessibility to
retention the target group
Quality of Security, quality
the service of the service,
delivery Management of
user profiles,
system integration
Acceptable Partner
division of selection,
roles network
openness,
network
governance,
network
complexity
Acceptable Pricing,
profitability division of
investments,
valuing
contributions
and benefits,
division of
revenues
Clear joint Partner
strategy selection,
network
openness,
network
complexity
Unobtrusive Customer User profile
customer retention management
retention
Acceptable Valuing
risks contributions
and benefits,
division of
investments
128 H. De Vos and T. Haaker
Quality of the Value Proposition and Quality of the Delivery System are
unsatisfactory. If we look at Table 5.3, this implies that several CDIs from
the service and technology domain, for instance Creating Value Elements
and Quality of the Service, should be reconsidered.
Service domain
Evaluation Specify
of CSFs relevant CDIs
Technology domain
Specify
relevant CDIs
Balancing
Organization domain domains
Specify
relevant CDIs
Finance domain
Specify
relevant CDIs
domain are both related to the CSF Clearly Defined Target Group’. Hence,
when the target groups are further specified in the Service domain, the
focus in the technology domain is on how these target groups are to be
given access to the service: Which technologies do they use? Do they need
to purchase specific equipments? The result will be a balanced technology
design with specific target group characteristics. When refining CDIs for
each CSF, attention is paid to balancing the domains automatically, due to
related CDIs. This approach is illustrated in Fig. 5.7. Also, this approach
will lead to redesigning or detailing design variables.
1. Clearly Defined Target Group
Evaluation Specify
of CSFs relevant CDIs
6. Acceptable Profitability
Specify
relevant CDIs
8. Acceptable Risks
Specify
relevant CDIs
apply to the CDI Targeting, which is linked to the success factor Clearly
Defined Target Group.
As far as the Hunebed case was concerned, the CSFs Quality of Service
Delivery and Quality of the Value Proposition were unsatisfactory. This
implies that the related CDIs should be refined or reconsidered. One of the
CDIs involved is Creating Value Elements, which refers to value creation
for the targeted users of the service, i.e. senior couples. Elements regarding
mobile ICT services that are relevant to the Hunebed case are accuracy,
support and distribution. Accuracy involves the exact positioning of the
users and an up-to-date map that contains sightseeing information and
small roads for hiking and cycling. This needs to be taken into account in
service development in the technology domain. The service aimed at a
target group that is not necessarily used to this kind of technology. A user-
friendly device and software are necessary, including support in case of
any questions and problems. The PDA could be equipped with a direct
telephone connection to a helpdesk. Alternatively, a help function or
frequently asked questions could be provided. Distribution is another value
element. The initial business model uses the local tourist offices for
distribution, which means users are dependent on a limited number of
pick-up points, with limited opening hours. Preferably, every small village
has at least one location where PDAs can be picked up and dropped off
132 H. De Vos and T. Haaker
The focus of the business model design process has been on realizing a
viable design, adding value for the intended customers as well as the
providers. Step 4 involves the evaluation with respect to robustness and
adaptivity. As we have seen in Chap. 2, business models evolve over time
under the influence of the external business environment. Robustness of
the business model has to do with the ability to cope with changes in the
business environment. Is the service, for instance, dependent on the
availability of complementary products or services which it does not
control? In addition to robustness, the business model’s capacity to adapt
to external influences is an important evaluation criterion. Typical
examples of external influences are changes in user requirements,
regulatory changes, emerging new target groups and changing scale of
operation, the application of a different revenue model or the incorporation
of a new technology.
Robustness may be assessed by asking what-if questions, for instance:
was used to assess the viability of business model alternatives with respect
to the relevant CSFs.
Three core issues are at stake when discussing the practical implications of
our design framework. The first has to do with the support of the service
design with more practical marketing-related tools, the second with how
bundles of services can be composed, and the third with the embedding of
services in the existing business processes of the organizations involved.
The first question is how to get from high-level service definitions and
business models to a more specific, down to earth and practical
implementation. Our design method provides generic guidelines and
approaches, and includes options to use more elaborate, focused and/or
detailed methods and tools. In Chap. 5 we give some indications about
which methods and tools can be helpful, but we don’t offer a systematic
overview of how to deal with specific issues. For example, e3value
(Gordijn & Akkermans, 2001) provides an ontological approach to
modeling networked value constellations. In some of the cases that will be
presented in the next part, the need for more detailed methods and tools
was felt. In a next phase of our research into service business model, we
will provide additional tooling and practical manuals on how to use our
design method.
140 H. Bouwman, E. Faber, T. Haaker, and R. Feenstra
services and what the specifications of these services will be. This is an
essential phase, as the actors should have a common understanding of
the end service to be delivered, and the role of constituting services in
the final end-user service.
• The moment agreement is reached regarding the services to be used and
their specifications, the composition can be realized. Subsequently, the
implementation phase starts, in which the combined services (the
composition) are realized and tested in an experimental setting or on a
test market.
From an academic point of view, we have only just begun working on the
validation of our concepts and model. Moreover, we also are looking for
possibilities to reflect on our business model approach in terms of
robustness and predictive validity. In this section we deal with these three
issues in greater detail.
144 H. Bouwman, E. Faber, T. Haaker, and R. Feenstra
In Part I, we did describe how concepts and ideas with regard to service
innovation and business models evolved from definitions of the core
concept toward a development and design method, and subsequently the
development of causal models. These causal models are not only related
to how we can understand the dynamic relationship between external
conditions, phases and the customer and network value of our models, but
also to the causal relationship between CDIs, CSFs and the value for the
consumers and providers of the services. One of the core problems with
regard to these analyses is that the number of cases available to us, as well
as the nature of the information that we need in order to be able to do
rigorous testing, is limited. Cases are not always as rich as we expect them
to be, the information we need is only partially available or accessible,
specifically with regard to financial data, and cases are of an unequal
magnitude or scale (see also Chap. 7). It is clear that further validation
is required, but that practical conditions hinder a rigorous validation.
Nevertheless, we have the opportunity to test our concepts in an indirect
way, by looking at the research perceptions of the business developers,
designers and managers involved in projects regarding innovative mobile
services and their business models.
of using specific parts of our method, the role of the facilitator and the
nature of the topics that are being discussed, on the performance of our
design method. This research, which is both qualitative and quantitative in
nature, was based on six sessions in which the STOF method was used.
The study confirmed the usefulness and value of the method. The results
provide sufficient reasons to continue our business model research in the
direction that we have chosen. We have since conducted a larger number
of sessions and used the method in a number of projects that resulted in
mock-ups, prototypes, and even some services that have been brought to
the market. Having said that, we realize that further research is needed into
the performance of our approach. Future work will have to focus on of
improving the evaluation and validation tools, which in turn will yield
improved versions of the STOF method.
In Part II of this book, we shift our focus from the description and
conceptualization of our business model framework toward the actual
application of the STOF model and method. The cases themselves, and the
goal and results of applying our model and/or method, vary considerably.
The diversity of applications are proof of the generic applicability of our
approach to the business models development in different mobile services
domains and sometimes even beyond, i.e., for e-services in general. In all,
we have included eleven cases. Some applications have as their primary
objective the validation of (parts of) the STOF model. In Chap. 7, the
validation of (critical) design issues and success factors for business model
Chapter 6 What’s Next? Some Thoughts and a Research Agenda 147
Table 6.1 summarizes all application, showing the primary purpose of each
case (validation, analysis, design), as well as other case characteristics, i.e. the
number of services considered in each case (single, multiple), the degree of
domain specificity (generic, specific), the focus of the cases (business model
domains, CDIs, CSFs), and finally the target market\b2b, b2c).
Part II starts with the chapters on the validation of the STOF model. The
subsequent chapters focus on the analytical uses of the STOF model and
method. The final chapters focus on the application of the STOF method in
designing business models.
Part II Applications
Chapter 7 A Practitioner View on Generic Design
Issues and Success Factors
What are the generic design issues and success factors for mobile business
models that practitioners find the most critical? In Chap. 3, we defined
Critical Design Issues (CDIs) as topics that need to be addressed in the
service, technology, organization and finance domain of business models.
Ultimately, Critical Success Factors (CSFs) predict whether a business
model will be viable, i.e. whether it will create sufficient value for customers
and capture sufficient value for the providers of the service. Generic design
issues and success factors are in contrast to critical design issues and success
factors not directly related to a specific to be designed service. This chapter
deals with practitioners’ views on such generic issues and factors.
The design issues and success factors are derived from a set of
exploratory case studies (see Chap. 3). The question is whether they are
supported by a broader group of practitioners, dealing with business
models that we did not study before. Do the various types of players in the
industry agree on which generic design issues and success factors should
be addressed? And are they of equal importance throughout the business
model life cycle? In this chapter, we address these questions by presenting
the results of an international survey among operators, content providers,
application developers and experts dealing with mobile services.
We start with a brief discussion of the methodology underlying the
survey. Next, we present the results regarding design issues, discussing
their relevance in general and in relation to the type of organization and the
phases in the business model life cycle. Similarly, we present the results
for the success factors.
Chap. 3. They were asked to rate the extent to which they take these issues
into account when designing services. To put the questions into context,
we asked respondents to focus on their most important service offering.
Additional questions were included regarding the type of organization of
the respondents.
Finding respondents for such types of surveys is challenging, keeping in
mind that there is no database that contains all the relevant practitioners in
the mobile services industry. In total, 521 directed invitations were sent
out, resulting in 137 business participants and 16 academic experts. The
reasons provided for not taking part in the survey were lack of time, lack
of expertise to answer the questions and no interest in the study. A specific
group of non-respondents consisted of hardware providers and network
manufacturers, who commented they did not feel involved in mobile
services, but only with technology platforms. Several academics also
turned down our invitation, predominantly because they felt they had
insufficient expertise to answer the detailed survey questions.
The final sample contained 153 respondents, 78% of whom came from
industry, with 22% academic and consultancy experts. Although the survey
targeted an international audience, most respondents are from the
Netherlands (64). Other regions included in the sample are Scandinavia (18),
Germany (9), USA (8), Austria (7), UK (6), Italy (6), France (3), Latin-
America (2), Asia (1), Australia (1), South-Africa (1) and other European
countries (7). Most industry respondents work at organizations that have
been active in the mobile domain since 2000 (65%), while 35% work at
organizations that were active even before that date. Similarly, 41% of the
respondents were active in the mobile field before 2000, while 59% entered
the domain at a later date. Our sample represents a wide variety of ‘most
important services’, including advertising, banking, blogging, communi-
cation, e-mail, entertainment, erotic, games, health, Internet, location-based
services, news, office, portal, radio, sports information, streaming, surveys,
transport information, TV, user-generated content, weather information and
workforce management. Of the total number of respondents, 32 adopted the
point of view of a (virtual) network operator, 20 that of an application/
software provider, 27 that of a consultancy firm, 31 that of a content/service
provider, publisher or content aggregator, and only three that of a
hardware/equipment manufacturer.
Of the organizations in our sample, 77% collaborate with other
organizations to provide a service. They interact on a day-to-day basis with
no (27%), one (20%), two (19%), three (15%), four (6%), five (4%) or
even more (10%) organizations.
Chapter 7 A Practitioner View on Generic Design Issues and Success Factors 155
This section presents the results of the generic design issues’ importance
based on 119 completed questionnaires. The respondents were asked to
what extent they took the design issues into account, on a 7-point scale
ranging from ‘not at all’ (1) to ‘great extent’ (7).
The most important design issue in the service domain is Defining the
Target Group (see Table 7.1). The second most relevant issues are Trust
and Branding. Overall, all design issues appear relevant, as their score is
remarkably higher than 4. The standard deviation varies between 1.2 and
1.6 for the service domain issues, which indicates mixed opinions.
In the technology domain, the most important issues are Quality of
Service and Accessibility for Customers. What is interesting here is that
Accessibility for Customers is viewed as being considerably more important
than Accessibility to Content Providers. User Profile Management is
considered less important. Presumably, many of the services that are
currently being developed do not yet use profiling techniques. It is also
possible that these techniques are not being used because authenticating
users is difficult for content providers. The design issue Security shows a
remarkable pattern: while the average rating is only 4.9, the rating that is
given most often is 7, i.e. ‘Great extent’. This indicates that opinions among
the respondents vary considerably. The average score for technology design
issues exactly equals the average score in the service domain, which means
that the two domains can be considered equally important.
156 M. De Reuver and H. Bouwman
Finally, in the finance domain, Pricing stands out as the key issue.
Topics relating to dividing investments, risks, costs and revenues among
partners are considered less important. However, it should be noted that
more than a quarter of the respondents indicate that, because they do not
work together on a day-to-day basis with other organizations in providing
the service, this type of financial issues is less important to them. The
average ratings in this domain are lower than in the other domains.
Overall, we find evidence that suggests that all design issues are
relevant. With the exception of two of the design issues (i.e. Outsourcing
and Division of investments), all are given a score above 4. This
indicates that the respondents do take them into account when they design
a service. We find that service and technology-related issues are perceived
as being slightly more important than organization issues and far more
important than finance issues. Given that service and technology issues
are related to creating value for customers rather than capturing value
for the providers, organizations appear to focus more on value creation
than on value capturing.
Based on the fact that organization and finance-related design issues are
given less attention, one might argue that this explains why many mobile
services turn out to be less profitable than expected. While organizations
seem more comfortable when they are dealing with service and technology
issues, the more strategic organization and finance-related issues do not
appear to receive sufficient attention. This may indicate that there is a need
for greater awareness with regard to organization and finance-related
issues, and for the development and diffusion of theories and tools to deal
with these issues. On the other hand, the fact, that more than a quarter of
the respondents does not work together with other organizations in
providing the service, may also explain part of the lower ratings.
Different players care about different issues. When comparing the ratings
of design issues, there are variations among the four most prominent
organization types in our sample, i.e. operators, content providers,
application providers and consultants. The variations are presented in Fig.
7.1, on a 7-point scale for importance, ranging from ‘not at all’ (1) to
‘great extent’ (7).
In the service domain, it appears that Branding and dealing with
different versions of the service (Versioning) are considered less relevant
by consultants. On the other hand, Personalization is considered more
important by application providers. This may be because personalization is
158 M. De Reuver and H. Bouwman
Branding*
Branding*
Personalization
Personalization
Dealing with
Dealing with versions
versions
System
Systemintegration*
integration*
Security*
Security*
Use
Useof
ofaccepted
accepted
standards
standards
Outsourcing*
Outsourcing*
Pricing
Pricing
0 1 2 3 4 5 6 7
Branding*
Branding*
Personalization
Personalization*
Scalability
Security
Security
User profile
profile
management
management
Managing
Managing relations
relations with
with partners*
partners*
Openness
Openness to
to new
new
partners
partners
Valuing
Valuing contributions
contributions &
& benefits
benefits
0 1 2 3 4 5 6 7
Fig. 7.2. Importance of design issues in relation to life cycle phase (Kruskal–
Wallis test, * p < 0.05)
Chapter 7 A Practitioner View on Generic Design Issues and Success Factors 161
A top-5 of most important design issues for each of the phases in the
business model life cycle is presented below. Generally speaking, most of
the design issues are equally relevant in all the phases. Quality of Service,
for example, appears the most critical issue in all phases.
To summarize, the top-3 success factors for mobile business models are:
One might expect the various players to pursue different goals with their
mobile services and business models. However, when we compare the
ratings for the four types of organizations in the sample (i.e. operators,
content providers, application providers and consultants), then we don’t
find statistically significant differences. There is an indication, however,
that operators consider Acceptable Quality of Service more critical than
content providers and application providers. This may be due to the fact
that operators are more responsible for the actual quality of service, and
because they are more directly involved with issues relating to the quality
Chapter 7 A Practitioner View on Generic Design Issues and Success Factors 163
Although one might argue that the objectives of service offerings shift over
time, we find only slight variations with regard to the importance of
success factors across the phases in the business model life cycle, see
Fig. 7.3. The only significant difference is Clearly Defined Target Group.
While this is the second most important factor in the Technology/R&D
phase, it becomes one of the least important factors in the Market phase.
Apparently, it is the most relevant in the early stages, becoming less
important once the target group has been established. It is also possible
that finding niche markets is more important for newly developed services,
compared to mature services that expand over time from niche to mass
market services, making targeting less of an issue. There are slight vari-
ations across the phases as far as the other success factors are concerned.
The top-3 success factors per phase is given below. This list illustrates
the finding that the importance of success factors hardly depends on the
phase in the business model life cycle.
AcceptableAcceptable
profitability
& risks & risks
profitability
Acceptable
Acceptabledivision
divisionof
roles of roles
Unobtrusive customer
Unobtrusive
retention
customer retention
Acceptable
Acceptablequality
qualityof
service
of servics
Clearly
Clearly defined
defined target
target
group*group*
Compelling
Compellingvalue
value
proposition
proposition
0 1 2 3 4 5 6 7
Fig. 7.3. Importance of success factors related to life cycle phase (Kruskal–
Wallis-test, * p < 0.05)
7.3 Conclusions
Generally speaking, we find that all generic design issues and success
factors are considered important by the respondents, although some are
considered more important than others. Overall, service and technology-
related design issues are perceived as being more important than
organization and finance-related issues. As far as several design issues are
concerned, there are differences in opinion between the various actors
in the value network (i.e., Branding, Versioning, System Integration,
Security, and Outsourcing). We also find that some of the design issues
become more relevant as a service moves through the various phases of the
business model life cycle (i.e. Branding), while others become less
important over time (i.e. Personalization). According to the survey results,
the top-10 most important design issues are: Quality of Service,
Accessibility for Consumers, Clearly Defined Target Group, Trust,
Branding, Scalability, Personalization, System Integration, Unobtrusive
Customer Retention, and Use of Accepted Standards.
Success factors relating to value creation for customers are slightly more
important than those related to capturing value for service providers. There
Chapter 7 A Practitioner View on Generic Design Issues and Success Factors 165
The business model studied here is the well-known case of i-mode from
NTT DoCoMo which is a mobile Internet portal service offered in the
Japanese market. In studying this case, information on external drivers and
internal business model components was structured according to the model
while taking into account the various phases. Then, it was analyzed what
external drivers were most important for this case, and how they triggered
changes in the business model design choices.
While the in-depth study of a single business model can provide valuable
insights, broader insights can be gained by contrasting different business
models. In a second study, six business models were studied, including
i-mode. By contrasting the findings, the importance of the drivers across
cases was studied. In addition, links were studied between external drivers
and the organizational arrangements in the business models. As such, the
study entailed both cross-case and within-case analysis.
To ensure maximum insight from a limited number of business models,
one can select those that differ regarding important dimensions. In this
study, the disruptiveness of the innovation and the type of industry were
used as differentiators. Table 8.2 provides an overview of the cases studied.
The cases were coded by three observers. After training them and
comparing the results of a first case in order to see if any problems
occurred, they analyzed the cases independently. While coding the cases,
they used a coding protocol similar to that in the first study. However, this
Chapter 8 The Dynamic STOF Model in Practice 173
protocol also provided checklists of the types of aspects they could find in
the cases regarding the drivers, components and performance issues.
One of the cases, i.e. Kodak was eliminated because multiple services
and products were introduced, while none succeeded to enter the second
phase.
The research question addressed in this study was which external drivers
would be most important in which phases, thus validating the propositions
in the STOF model. To answer this question, aggregate measures of the
driver variables were computed. These were a ratio-scale measure that
simply counted the number of lower-level driver variables of the relevant
type that were deemed relevant by the coder, and a binary-scale measure
that indicated whether or not any of the lower-level driver variables were
ticked in the coding of the case.
In regression analysis, the aggregate measures for the driver variables
were used as dependent variable, and the phase of the business model as an
independent variable. In doing so, both linear regression (using the ratio-
scale measures) and logistic regression (using the binary-scale measures)
could be conducted.
An example of resulting output is given in Tables 8.4 and 8.5, which
relates the importance of technology drivers to the phase of the business
model. These results indicate that technology drivers were far more often
found in the first phase of cases, and less in the second and third phase.
Chapter 8 The Dynamic STOF Model in Practice 177
The study discussed here illustrates how the STOF model may be used
in analyzing large sets of case descriptions in a quantitative approach.
Research questions answered in this approach can be various, for example
on the impact of technology changes on the likelihood of forming alliances
in the organizational component of the business model, or on even more
complex questions linking drivers, components and performance metrics.
By including background variables, one can contrast analyses of different
types of cases, thus allowing more specific cross-case analyses.
An advantage of the quantitative approach is of course that larger
numbers of cases can be studied, allowing for statistical generalization.
However, it is still advisable to approach the research question first in a
pilot study, using a smaller set of cases in a qualitative approach, and then
use the lessons learned to develop a more stringent quantitative protocol. It
is highly important to have rich information in the case description and to
operationalize the core concepts to be measured in a strict approach.
Failing on these criteria may lead to inconsistencies in the coding of
independent coders, and hence unusable results.
8.4 Conclusions
This chapter showed how the STOF model from Chap. 2 can help in
analyzing the dynamics of business models in a structured approach. By
structuring information about external drivers and internal business model
components along the phases of a business model life cycle, the STOF
model helps to understand the dynamics within a specific business model.
We also showed how the model can be used to compare a limited set of
business models in a qualitative approach. Finally, we discussed a
quantitative study of a large set of cases, in order to do statistical analysis of
the patterns in dynamics of a larger set of business models. In general, we
advise combining qualitative and quantitative approaches in these studies.
Chapter 9 A We-Centric Service: The
PolicePointer
apply the STOF model to the service concept and discuss the critical
design issues in the business model underlying the PolicePointer.
the intended user experience, when it comes to services that are still in a
proof of concept phase and that are being developed and evaluated. It also
limits the pragmatism required when developing an innovative concept
whose end result is not yet clear. A stakeholder outside the ICT
organization suggested that the reference architecture implies a major
decision at the start of a new service development cycle. On the one hand
when the central ICT organization is involved early on, this guarantees
compliance with the reference architecture. However, it would also mean
that the majority of the budget is being spent on complying with the
centrally enforced architecture, although the service concept may not even
be evaluated as worthwhile in the end. On the other hand, if the ICT
organization only becomes involved when the service concept has been
tested and prototypes and pilots have been developed, the costs may be
even higher, because the concept and systems may have to be adapted to
fit the architecture.
There is also the issue of trust, which is important in the service/concept
development phase, because unforeseen events are likely to occur which
cannot be accounted for in contracts. In addition, because changes in the
original design of the service are likely to be made in this phase, strict
contracts and project plans would have to be revised often. There is a
general lack of trust between police regions and the central ICT
organization, partly as a result of ongoing reorganizations that have led to
uncertainty. While trust between the organizations is growing, some police
regions comment that recent experiences in service innovation with the
central ICT organization have damaged their existing relationships.
With regard to the PolicePointer case, a recommendation was made to
complement contracts (i.e. service level agreements and project plans) with
trust-based, close collaboration to benefit the innovation and implementa-
tion process. As we discussed above, most cooperation with the ICT
organization is based on hierarchical structures and strict rules and
contracts. Developing trust and an entrepreneurial approach based on
partnership during the implementation and roll-out of the service was
deemed more advisable.
Another important design issue is Partner Selection. As we discussed
earlier, the central ICT organization cannot force the police regions to
adopt a service. Therefore, involving the regions at an early stage is
important to get feedback on the service concept and ensure commitment
to the innovation process. So far, few police regions were directly involved
in the development of the PolicePointer. Therefore, a crucial issue would
be how to involve the police regions.
Also related to partner selection is the choice towards the technology
providers. As the service concept and prototype were developed by the
188 M. De Reuver and M. Steen
The decisions in the finance domain depend on the trajectory chosen for
the innovation process. In most cases a police region requests a new
service from the central ICT organization. Once all regions agree on the
need for the new service, the central ICT organization starts developing the
service. After testing the service concept, a pilot is conducted within a
specific region where the service actually runs on the infrastructure that
will be used. After that, the service is implemented, integrated into existing
systems, and rolled out on a nation-wide scale. An alternative, less
common trajectory, is one where the central ICT organization auto-
nomously decides to develop a new service, after developing a detailed
business case. In this trajectory, the account managers of the ICT
organization have to sell the service to the police regions after it has been
developed. Investments in this case are made by the central ICT
organization.
To implement the PolicePointer service concept in the police
organization, a trajectory, in which police regions request for a new
service, is not applicable, because the service concept has already been
developed and validated. The other trajectory would be that a business
case for the service is developed by the central ICT organization. A
detailed design of the finance component of the business model would then
be required to show the viability of the system in terms of costs and
revenues. After implementing and rolling out the system, police regions
could autonomously decide whether or not to adopt the service. This
trajectory requires Investments to be made by the central ICT organization,
and involves the Risk that police regions will not adopt the service. Pricing
is therefore an important issue here, as the added value of the service
would have to outweigh the costs involved in adopting the service by the
police regions.
An alternative, more feasible business case trajectory would be to frame
the service as part of a new release of existing mobile services such as P-
Info, in which case, the PolicePointer would be bundled with these existing
services. As payment would be included in the bundle tariff for the
existing mobile services, Pricing can be determined by the central ICT
organization. Although Investments are still made by the central ICT
Chapter 9 A We-Centric Service: The PolicePointer 189
9.6 Conclusions
create realize
Trust, Ease of Use, Cost and reach, i.e. Access for consumers as well as
merchants (Ondrus & Pigneur, 2006) (see Table 10.2). Ondrus and Pigneur
also mention, for instance, flexibility – the degree to which a technology
can be adapted to various types of payments – and maturity of technology.
10.2.1 Mobipay
10.2.2 Moxmo
10.2.3 Mobile2pay
10.3 Conclusion
Based on the three cases discussed in this chapter we can draw initial
conclusions with regard to customer value. First of all, it is important to
realize that services that are innovative in technological terms are not
necessarily perceived as very innovative by their intended customers.
Mobile payment services in themselves offer yet another way, in addition
to cash money, credit and debit cards, of taking care of payments. This
implies that positioning a mobile payment channel next to already existing
payments channels is problematic. Although such a service may be new to
the world from a technological point of new, that does not mean that
customers are guaranteed to see the added value for them. Furthermore,
merchants, who after all control the relationship between the mobile
payment services and the end user (the customer), are unlikely to adopt the
mobile payment channel if it does not solve some of their problems. This
means that, in the service offering, the issue of value has to be addressed
very carefully for both customers and merchants. A possible alternative is
Chapter 10 Balancing Customer and Network Value of Mobile Payment Services 203
prospects of the new IPTV model. As yet, there is no common and shared
conception of business models.
In this chapter, we used the STOF method to develop business models
for IPTV. We draw a distinction between the exploration phase and the
exploitation phase. With regard to the exploration phase, we discuss design
issues based on the results of experiments and market explorations by
IPTV developers that are currently taking place. After discussing the trade-
offs between the various design choices in the IPTV domain, we use
scenario analysis to discuss issues that may be relevant in future exploration
phases: IPTV developers will focus on issues like service (bundles) and
more efficient marketing strategies. We use the scenario analysis to assess
the robustness of the business models, like those of IPTV, that are
characterized by high levels of uncertainty when they enter the
exploitation phase.
Within the technology domain, there are three layers of architecture when
it comes to IPTV. The transport layer design has to ensure that the
infrastructures meet transmission requirements. The design of the
middleware and content layers has to be given careful attention, because
the design requirements are vital to specific types of services (e.g. VoD,
PVR, or focused service portfolio’s) and to the interactivity of the services.
The conditional access components and middleware control the access
authorization, manage the Customer Relation Management (CRM) and
take care of the encryption of the video program. The set-top box is used to
decode programs on the end-user’s side. Different IPTV providers opt in
favor of different video application components, based on service design
demands and financial considerations.
In the technology domain, bandwidth limitations, quality of service and
level of middleware capability are the main issues. The telecom operators
can choose different design approaches, either by adding large capacity
immediately before launching IPTV or by doing so gradually. The former
approach usually leads to upgrades of large portions of the infrastructure
towards fiber optic cables, while the latter approach involves the plan to
begin by updating most of the distribution network towards ADSL2+
standard. The choice with which telecom operators are faced is between
the more advanced technology platforms and larger investment on the one
hand, and a more evolutionary approach on the other (Fijnvandraat &
Bouwman, 2006). Because video content is sensitive to signal quality,
service quality is the second issue at stake. Service quality can be
208 H. Bouwman, M. Zhengjia, P. Van Der Duin, and S. Limonard
Equipment
provider
Video
Content Middleware Carriage Consumption
distribution
Broadband
Content
Advertiser
Consumer
creator Telephone
Bundling
Technical and service design choices determine the costs of IPTV projects.
For example, a high level of availability of services requires a large
investment in setting up redundant servers to make sure there are sufficient
video sources at peak times. Interactive services require financial
investments to upgrade network equipment and to solve technical
problems. The revenue models depend on revenue sources, for instance
advertisement or flat rate models, and the accompanying pricing models.
Revenue can then be calculated by the size of market and the expected
market share.
In the current IPTV market, most telecom operators use a flat rate
subscription model, and they are slowly adopting pay-per-view models as
well as advertising in the case of VoD services. However, if more
customized and personal services were to come available, a flexible
pricing model would be more desirable and feasible in the future. To
assess the robustness of the various designs we will use scenario analysis.
Hand on regulation
Strict anti-trust policy toward the big telecom Monopolies through large scale mergers. Anti-
operators. Television market is dominated by trust policies. Strict regulations for telecom and
several vertically integrated and global cable industries.
companies. Keywords: value-added service, balance
Keywords: QoS, leverage experiences and between service attractiveness and potential
expertise from broadband to television, synergy revenue loss, flexible pricing.
effect.
Modest economic growth. Growing competition High economic growth. Less regulatory
between telecom operators, new entrants, cable constraints, more similarity in regulations for
and satellite companies. Light regulation cable and telecom industry.
regime. Keywords: content diversity, broad cooperation
Keywords: bundling, aggressive bundle between content providers, user generated
discount rates, horizontal organization content, full use of IP-based transmission.
integration, sufficient bandwidth.
We will discuss the four scenarios in greater detail and illustrate the
kind of design choices that become relevant in the exploitation phase of
IPTV business models.
Chapter 11 Robustness of IPTV Business Models 211
Telecom operators are not restricted by tariff regulation and have the
freedom to form alliances with content providers. The younger generations
of consumers are quick to adopt the new services that are offered at an
affordable price. Most of them like easily configurable digital TV, telephone
and broadband services. Consumers show an interest in bundling. The most
popular packages are the discount offers from the multi-services providers.
Bundling complementary products is an attractive strategy, given the fact
that consumers will value bundled services more than the total added value
of the separate elements. Telecom operators are the only players capable of
providing quad-play. Although cable companies are triple-play veterans,
they have a hard time catching up with telecom operators. However, market
success is not simple in a market where several competitors (cable) are
capable of offering similar service bundles. Telecom operators should focus
on the preference ‘simple’ users have for easy and quick configuration and
entice more consumers by introducing bundled products. Telecom operators
are in a position where they can bundle the IPTV and broadband services. In
most cases, IPTV and broadband services are independent products and the
costs involved in providing them can only be reduced through bundling.
However, in some cases they become complementary, which means that
they add value for end-users.
Bundling has an effect on several business model aspects. In the
technical domain, bandwidth is closely related to service bundling.
Bundling broadband and video service requires high bandwidth capacity
(e.g. video service requires at least 2–3 Mbps and broadband requires
around 1 Mbps; the total is about 3–4 Mbps). Bandwidth will be the key
enabler of bundling services. This means that a network upgrade to fiber or
hybrid type is needed. In the organizational domain, horizontal integration
is necessary in order to offer service bundles. It is a challenge for telecom
operators to coordinate the activities of the newly established video
business unit and the traditional broadband and voice business units, to
provide seamless bundles and efficient billing systems. In the financial
domain, it is very important to choose the right pricing and discount rate.
Telecom operators have to balance the technical and financial design to
control costs and to be able to offer a modest monthly rate to most
consumers. This pricing strategy can be modified to predatory price levels
that are enabled by economies of scale and scope. This can create
competitive advantage and entice more consumers to the convenient triple
play configuration.
212 H. Bouwman, M. Zhengjia, P. Van Der Duin, and S. Limonard
11.4 Conclusion
T. Haaker
The central issue in the service domain is ‘value’. Value is seen as the
perceived benefits and total costs (or sacrifice) of (obtaining) a product or
service for customers in target markets (cf. Chap. 2). Compared to
competitive offerings, a service must be considered better, and deliver the
desired satisfaction more effectively and efficiently. Important design issues
that influence the customer value of service bundles are discussed below.
First we consider new design issues in the service domain, i.e. Bundle
Focus, Bundle Composition and Bundle Strategy. This is followed by a
discussion of CDIs Pricing and Branding from a bundle perspective. Finally
we discuss bundle related CDIs in the technology domain, i.e. Service
Integration, which is a new issue, and Management of User Profiles. Both
issues may influence the customer value of a bundled offering.
Bundle Pricing
Strategy co-determines
S F
Acceptable
Quality of enable
Quality of Ser-
Service
T vice Delivery T
System
Integration
T
Fig. 12.1. Revised causal framework explaining the customer value of mobile
service bundles
In this section we look at how the CDIs occur in the explorative case
studies. For each of the different bundle types we discuss the design
choices for the bundle related CDIs.
Operator Portals. By nature the scope of the operator portals is very
broad. They target a mass-market. The portal branding is such that the
operator brand is always clear. However, often the content providers’
brands are used as well. Access to the portal is always bundled with a basic
voice subscription, or, in the case of pre-paid, separately billed. The third
party services available via the portal are offered and priced completely
independent, i.e. an unbundled strategy is followed by the portal and
226 T. Haaker
content providers. The content services are not price bundled nor product
bundled (Stremersch & Tellis, 2002), i.e., bundle discounts do not exist,
and content services in the portal are not integrated in any way. Customers
select their services on a monthly or per use basis. The critical design
choices are summarized in Table 12.1.
regarding ‘matching’ lies with the users. In the Botfighter case the location
of game participants is determined automatically via cell-ID. Clearly profile
management is an important issue for community oriented bundles.
Integration between services clearly exists in the Botfighter and MSN
Messenger case. For example the robot profile in Botfighter is created on a
website and subsequently used in the mobile game. With Messenger most
services are integrated with the buddy list and can be evoked from the
buddy list environment. For the Blah! case integration is basically absent.
Blah! can be considered a ‘lifestyle’ portal which provides access to
multiple information channels. The matchmaking and communication
services between Blah!-members provide for the community aspects. For
Blah! and MSN Messenger the bundling strategy can be characterized as
add-on bundling. With Blah! the information channels are freely available
whereas the SMS communication service is offered as a premium add-on
service. Similarly, for MSN Messenger the core communication services,
as well several complementary services, are freely available to all
subscribers and the premium services are provide as add-ons to the core.
The bundle strategy in the Botfighter case is pure bundling, i.e. all services
in the bundle are available to users once registered. Pricing is not a big
issue in community oriented bundles as most services are for free, except
for some premium (SMS) services. The critical design choices are
summarized in Table 12.3.
Interaction Oriented Bundles. Interaction oriented bundles are more
targeted towards niche markets. Onstar’s core proposition is about safety,
whereas Predoc focuses on staying healthy. Both bundles have human
assisted services as core, i.e. Onstar operators assist during emergencies
via a direct voice link and pharmacies associated with Predoc provide
counseling on medication. Onstar started out with a clear focus on
emergency services, but extended its bundle beyond the safety theme with
supplementary services like voice calling. Predoc’s complementary
services basically enhance the core service.
Onstar sells single services as well as bundled service packages for a
special price, i.e. Onstar follows a mixed bundling strategy. Predoc on the
other hand provides a pure bundled offering. The subscription based
pricing model as used by Onstar is quite typical for interaction bundles, as
other revenue sources like advertising or data traffic are not relevant. A
subscription to Predoc is actually free for the customers of the pharmacy
chain providing the service. Both Onstar and Predoc are positioned as
separate brands although closely tied in with the provider’s brand.
Chapter 12 Mobile Service Bundles 229
The Onstar services are integrated in the sense that they are offered via a
dedicated device and call centre. The bundle is also clearly integrated with
a GM car. Profile management is not a big issue here. For Predoc the
necessary medical information is already available at the pharmacy and
is basically fairly static. For Onstar the car’s location is determined
automatically. The critical design choices are summarized in Table 12.4.
Transaction Oriented Bundles. The transaction bundles considered here
focus on mobile banking. Mobile banking bundles typically combine
transaction services (money transfer) with information services (account
checking, alerts). Mobile banking is typically seen as an add-on to internet
banking. The information services and the transfer of money are usually
230 T. Haaker
free of charge, except for the cost of airtime. Mobile banking has a broad
mass market focus with rather generic services. Bundling is basically pure
in these cases as the bank’s consumers have in principal access to all these
services. The services are offered via different mobile channels, e.g. via
SMS or regular calling, via a browser on the mobile device and/or via an
operator portal. Branding is basically that of the bank brand although also
a form of co-branding occurs in the operator’s portal. The mobile banking
services themselves are not integrated, but together they are an integrated
part of the internet banking environment. Users manage their own profile
via the bank. The critical design choices are summarized in Table 12.5.
Table 12.5. Bundle characteristics for the transaction oriented bundles
Case Postbank mobile banking ABN-Amro mobile banking
Composition (core) Mobile banking; SMS Mobile banking; SMS alerts
alerts and order status and order status
Composition Revalue pre-paid calling Financial news site
(complementary)
Focus Mass: banking Mass: banking
Strategy Unbundled Unbundled
Pricing Price per minute; premium Price per minute; premium
SMS SMS
Branding Bank brand and co-brand Bank brand
with operator
Service Integration Independent Independent
User profile management Self management Self management
Chapter 12 Mobile Service Bundles 231
The operator portals and the mobile banking bundles have a mass market
focus. The information and community oriented bundles can be both mass
market and niche market oriented, whereas the interaction oriented bundles
have a niche focus. The bundles with a mass market focus seem to follow
two distinct approaches. The first approach is to provide generic services
that appeal to a large number of customers, e.g. bundles for mobile
banking, generic news services (CNN) and presence and instant messaging
services (MSN Messenger). The providers of these bundles follow an
unbundled or add-on bundling approach. The second approach, followed
by the operator portals, is offering a very large number of services
(sometimes literally hundreds), such that there are services for every taste.
The portal operators also follow an unbundled approach where pricing is
service specific.
Providers of bundles with a narrow focus, e.g. P-info, TimeSpots and
Predoc, aiming at niche markets with more specific services, follow mostly
a pure bundling strategy. Only Onstar is found to pursue a clear mixed
bundling strategy.
Integration between services is most often found for bundles with a
niche focus. Providers of these bundles use integration to create added
value, e.g. in the case of P-info, Botfighter, Onstar and TimeSpots.
Bundling with a dedicated device is found for niche bundles, i.e. P-info,
Onstar and TimeSpots. Bundles targeted at mass markets typically make
use of the user’s personal mobile device.
Management of user profiles is most important for community oriented
bundles, much less for information and interaction oriented bundles.
Control over user’s profiles is typically based on self management, while
relationships with group or community members are based on mutual
agreements, i.e. group management. For P-info, a business service, profiles
are maintained at a central location. Location information in services
usually automatically collected.
12.5 Conclusion
This chapter presents additions to the STOF CDIs with respect to service
bundling. Whereas the focus in Chap. 3 was on CDIs for mobile services’
business models, this chapter particularly addresses new CDIs that arise
when mobile service bundles are considered.
232 T. Haaker
In this chapter, we illustrate how the STOF model can be applied to analyze
business models, using an SMS-based service that is deployed in a
developing country, i.e. Smart Padala in the Philippines. In addition, we
use the STOF method to design a business model for the introduction of a
remittance service in Haiti. Remittances are understood as transfers of
money from one person to another, in practice most transfers are by
foreign workers to their home countries.
The aim of our analysis of the Smart Padala business model, which is
based on reports and Internet sources (GSMA/IFC, World Resources
Institute, Smart), is to identify the issues that are characteristic of mobile
services in developing countries.
ATM
SMSC
network
The main providers of SMART Padala are Smart and its financial partner
Banco de Oro (BDO). The roles of the two main partners are delimited
very clearly: SMART serves as a transport system and hosts customers
who have no relationship with the bank, and it offers customers the
opportunity to send text messages to the bank’s systems. Banco de Oro is
the retail bank processing the mobile financial transactions. The service
operates entirely within the limits and the jurisdiction of the central Bank,
and as such Banco de Oro takes responsibility for auditing, fraud
management, account security, etcetera. The clearly defined roles of the
two major partners provide an enabling regulatory environment: the
telecommunication regulatory body has no interest in regulating this
service, since it does not involve unusual telecommunication aspects, and
as far as the financial regulatory body is concerned, the service facilitates
regular financial transactions. A third important group of partners is made
up of the associated retailers located overseas and in the Philippines.
With minor exceptions, SMART receives its income entirely from the
SMS charge levied for each transaction: $0.05 per user-generated SMS
activity; $0.02 for retail purchases; $0.06 for ATM withdrawals though
Banco de Oro and $0.21 for non-Banco de Oro ATM withdrawals; 1% fee
for cash deposits and withdrawals in the retailer network. These charges
are attuned to the low transaction fees charged in the Filipino mobile
market, normally $0.02 for standard SMS text messaging and $0.60 for
mobile credit top-ups. One of the positive outcomes reported by Smart is
mobile wallet revenue growth of 46% in 2005, and the use of Smart’s
Chapter 13 Designing Mobile Remittance Services in Developing Countries 237
Many Haitians live overseas and each year send up to $1.65 billion back
home, representing about a third of the country’s Gross National Product.
About 1.1 million adults in Haiti receive such remittances; typically 10
times a year and on average $150 per remittance. What is particularly
relevant here is the fact that 83% of the money is sent through remittance
companies, 6% through banks, 4% by mail and 4% through friends or
relatives traveling to Haiti (Boyd & Jacob, 2007). The social and economic
relevance may be clear, and the opportunities available to new players in
the remittance business and the introduction of new paradigms, such as
mobile remittances, is obvious.
SMS, it is easy for subscribers to start using remittance services and other
mobile banking services.
The service depends on the use of security technology and on the basic
SMS or Unstructured Supplementary Service Data (USSD) technology.
The recipient of the remittance needs a 16 digits ‘Smart Money number’,
which can either be retrieved by sending an SMS or by utilizing a SIM
toolkit menu. This ‘Smart Money number’ is stored in the SIM and is
accompanied by a password the recipient has to enter with each
transaction. Before the system can be deployed, the security and
encryption features have to be developed. Moreover, the technology can
have an effect on the ease of use of the SMS service. Illiteracy rates in
Haiti are high, which means that a simple system has to be designed that
can be provided by menus developed through interactive USSD or,
preferably, SIM Toolkit menus.
• The sender, the person who sends the money, goes to a Foreign
Remittance Center (FRC) and provides the recipient’s phone number,
electronic money number and a valid ID.
• Foreign Remittance Partner or Center (FRC), collecting the money to be
transferred. The FRC sends an SMS to the Recipient’s phone number.
• The mobile network operator providing the software and hardware
required for the electronic transfer of the money. The sender should
receive the confirmation message via the cell phone from the remittance
center.
• The recipient receives an SMS message (Beneficiary receives cash) that
‘cash’ has been sent to his or her cell phone.
Chapter 13 Designing Mobile Remittance Services in Developing Countries 239
The revenues need to feed all the partners within the value web. To begin
with, the remittance center – the location where the money is deposited –
will most likely receive a percentage. Secondly, the mobile operator will
benefit from the increase in SMS traffic. The operator deploying this
service will reinforce the relationship with its customers, which will reduce
the churn rate. Customers are less willing to switch to other providers once
their telephone number has been linked to an ‘electronic money number’
or identifier. Marketing the service is a costly affair. Getting people used
to the service either implies launching promotions which are free, or
creating some sort of viral marketing, as well as educating the subscribers
with regard to the use of the service. Other investments are related to
technology, i.e. the deployment of SIM toolkit and the deployment SIMs
of at least 64K to run the mobile commerce applications. The bank’s
incentive is related to the opportunity of reaching people who do not
normally use its services. If enough money is captured from remittances,
the float and interest provide an additional benefit to the financial
institutions.
13.4 Conclusions
As far as the mobile remittance case is concerned, the STOF model and
method proved helpful in analyzing and discussing design issues in a
systematic way, and in addressing critical design issues that are relevant
during the service design phase. Based on the analysis, a more detailed
business case can be constructed on the basis of the holistic framework for
the design of mobile remittance services. The analysis of the SMART case
in the Philippines helped us identify the success factors and design issues
that would make it easier to deploy a similar service in Haiti. At a service
level, user-friendliness is essential for an illiterate target group, and the
services for low income users need to be characterized by low fee/high
volume. At an organizational level, involving a bank is crucially important.
It is clear that one of the key success factors is the presence of a
partnership with a bank similar to the one with Banco de Oro in the case of
Smart. At a technological level, low-tech alternatives – such as SMS,
240 H. Bouwman and J.-C. Sandy
USSD and SIM toolkit menus – are relevant. The widespread use of and
familiarity with SMS technology is another factor. Problems regarding
identification and user-friendliness can be overcome by introducing either
USSD or SIM toolkit type of menus. At a financial level, both tangible and
intangible benefits need to be taken into account. We expect that a dual
market will develop in many developing countries, in which high-end
technological services are adopted by wealthy urban professionals on the
one hand, and low tech alternatives are made available to the less affluent.
Based on the examples in the Philippines and South Africa, we conclude
that mobile remittances and other types of mobile commerce are more
likely to take off in developing countries. Moreover, due to the multiplier
effect, the role of mobile services in social development and the use of
mobile financial identities provide a value-added essence to Mobile
commerce. Mobile commerce services will provide the tools that are
currently not available to poor people, due to the costs of the technologies
involved as well as the limited availability of the Internet. Mobile services
will enable mobile commerce to outperform e-commerce.
Chapter 14 Assessing the Business Potential for
New Mobile Services from Mock-Up
Evaluation
The aim of the MobiLife Integrated Project in IST-FP6 was “to bring
advances in mobile applications and services within the reach of users in
their everyday life by innovating and deploying new applications and
242 T. Haaker and B. Kijl
The business model task group in MobiLife prepared the set-up of the
business model design sessions. The sessions’ participants consisted of
MobiLife project members from various companies and organizations.
Although most of them had a technical background, there were also some
participants with a social science or business background. In each session,
around 15–20 people took part in a brainstorm and discussion about
several business model elements, focusing on potential user groups,
revenue sources and value network structures.
The sessions followed a pre-defined format that was prepared by the
task group. Task group members also acted as sessions’ facilitators.
Templates were prepared for the participants to write down their ideas
about the design of business model components.
After attending a brief introduction of the mock-up, the workshop
participants divided into groups of two, and were asked by the session
facilitator to think for about 5 min about potential Target Groups for the
mock-up introduced earlier. More specifically, they were asked to think
about potential customers (people who may pay for the service), potential
end-users (people who may actually use the service) and potential user
contexts. Although in some cases end-users and paying customers can be
the same people, this is not always the case. Each couple discussed
potential target groups and wrote their main ideas down on the template,
after which the main ideas where discussed in a plenary discussion of about
10 min. Every couple had the opportunity to present their ideas. The ideas
were directly processed and summarized by a second session facilitator –
using a laptop and a beamer. The results were directly visible to all session
participants, which stimulated discussion and helped generate ideas.
The participants were then asked to describe Value Drivers: potential
benefits of the service to end-users. They had to think about substitutes or
alternative solutions and were asked to think about how the mock-up could
be used to distinguish the product from these substitutes or alternative
244 T. Haaker and B. Kijl
The session’s set-up proved very useful for the both participants and
facilitators, as well as from a content point of view. By giving people the
opportunity to first develop and discuss their ideas in couples and
afterwards giving every couple the opportunity to communicate their
findings, all the participants had the chance to share their ideas, which
helped avoid a frequently occurring situation whereby only the most
extrovert people share their ideas, preventing those with a less sanguine
disposition from sharing their ideas, which in principle are equally
valuable. Also, the idea of using a second workshop facilitator to process
and share the workshop results – via a laptop and a beamer – seemed to
stimulate the idea generation process, i.e. by supporting participants to
build on each others ideas. The fact that people had to answer the final
question by drawing a Value Network in bigger groups of around six
people added an extra social element to the workshop. Although people
liked this way of working, it turned out most of them needed more time to
answer the question than was originally planned. This is partly due to an
increased need for communication, but it may also have to do with the
relative complexity of the question.
By alternating between small groups, bigger groups and plenary
discussions where every group felt a kind of social pressure to present
good ideas, everyone actively participated in the workshop. As a result, the
quality and quantity of the content yielded by the workshop was high –
especially when we take the limited time that was available for the
workshop into account.
Chapter 14 New Mobile Services from Mock-Up Evaluation 245
In this section, we look at some of the results of the business model design
sessions by focusing on the outcome of one session involving a specific
mock-up application, called the ‘Context-Aware Interpersonal Communi-
cator’ (based on Killström et al., 2006). After providing a brief outline of
this mock-up, we take a look at the findings for each of the business model
elements mentioned before. We conclude with a short discussion about the
critical open questions that the workshop yielded with regard to the
viability of the business model for the mock-up.
Note that the end-user in this service may play an active role as
co-creator of content, or as prosumer, e.g. in developing new types of
emotional information icons. Based on this identification, several value
networks were designed, one of which is shown in Fig. 14.2. Depending
on the type of customer, this model may be a ‘b2b2c’ model, if the
customer is a business client, or a ‘b2c’ model, if the customer is also the
end-user. In this network, the connectivity provider is an operator who
may also contribute billing capabilities. Studying alternative value network
structures and business configurations is helpful in finding a focal actor
that may lead the development of the innovation into a viable offering and
business model.
248 T. Haaker and B. Kijl
content Device
Advertiser manufacturer
content device
billing
context services
Context Telecom
provider operator connectivity
The results of the business model design sessions were processed further
and harmonized by the business model task group in mock-up business
model reports, which in turn were used to detect general issues that could
have a critical impact on the acceptance and viability of service offerings
based on the technology underlying the mock-ups. The generic issues point
to potential bottlenecks in the future viability of the services and require
special attention, preferably in the R&D phase. Challenges with regard to
MobiLife type of context-aware services were further studied in a series of
expert interviews (Haaker, Galli, et al., 2006).
Logical Actor on the Market. If there are clearly identifiable actors on
the market, the business model is easier to realize; this usually means
evolution of existing services by using new technology. If such actors do
Chapter 14 New Mobile Services from Mock-Up Evaluation 249
not exist or it is unclear who will take up new roles, it diminishes the
chance of defining a viable business model. Based on this finding, a
number of generic business models were defined and analyzed in which
the (new) roles, e.g., context or trust providers, were alternatively played
by different actors (Killstrom et al., 2007).
Revenue Sources. Research within and outside the MobiLife project
suggests that users are not willing to pay for these kind of mobile services
(Haaker, Galli, et al., 2006). This obviously decreases the possibility of
new business models, unless other new revenue sources can be found, e.g.,
advertisers. Most MobiLife-enabled services were found to be suitable for
this approach, especially since advertising could be personalized and
contextualized. Based on this outcome, advertising and subsidy-based
business models were analyzed further (Immonen et al., 2006).
Technology Specifics. We obtained specific business requirements about
the focal technological topics of Mobilife, i.e., personalization, group-
awareness and context-awareness. These requirements have an impact
on the further development of the technology and its applications. For
example, for personalization to be viable from a business point of view,
the technology has to be sufficiently generic, such that it can be used in
larger set of services (as opposed to being used only for a single service).
For group-awareness, the trust and privacy solutions in services increase
willingness of end-users to utilize the group-aware enabled services. Users
would, for example, require easy-to-use control regarding with whom,
when and for what purpose they share information about their location,
as well as other information. Subsequent mock-up evaluation by end-users
confirmed that users appreciate the potentially improved convenience, but
they do not wish to lose control of their own schedule and habits or
automating everything. Context-awareness business viability requires a
continuous flow of context-related information, which may be accompanied
by rising costs and organizational issues.
The mock-up evaluations were used together with other project criteria to
determine which mock-ups should be further developed into a (partially)
functioning prototype. The business assessment followed a scoring
approach in which researchers and task group members rated each mock-
up on a number of items that link to Critical Success Factors (see Chap. 3),
i.e., Clearly Defined Target Group (end-users and customers), Compelling
Value Proposition, Acceptable Division of Roles and Acceptable
Profitability. Each item was scored on a five-point Likert scale. The final
250 T. Haaker and B. Kijl
clear
Assumed customer
3
1 4
11 7
value
9
8
10 5
2 6
unclear
unclear clear
Assumed
network value
the separate mock-ups were not considered viable. For example parts of
MyLifeviewer (6) were integrated with the Context-Aware Interpersonal
Communicator (10) to form a new application called Context-Watcher
(Koolwaaij et al., 2006).
14.4 Conclusion
The STOF model divides business model reasoning into four easy-to-
comprehend domains. The STOF method helps to focus the design. Given
the limited amount of time available, many valuable results could be
obtained in a business model design session with project members. This
also proved a sound basis for further analysis.
The outcomes of the mock-up evaluations, together with other criteria,
were used to decide which mock-ups were continued or combined. Cross-
case analysis revealed revenue models and pricing as critical design issues,
which lead to research into advertising based models. The results of the
sessions with regard to critical issues also helped formulating the questions
to consider in the user evaluations.
In technology oriented projects, valorization is a general problem. It is
often hard to bring technical research to viable offerings, for various
reasons. First, the results are still far from the market, which makes it
difficult to bridge the gap from R&D to marketing (Chesbrough,
Vanhaverbeke, & West, 2006). This means that evaluating mock-ups from
the point of view of users and businesses is useful in identifying the
potential target groups and potential stakeholders at an early stage. The
STOF model and method make it easier to assess opportunities provided
by technological innovations in marketing terms, i.e., in terms of value
proposition, target groups, competitive edge, value network, revenue
model, et cetera. As such the STOF model provides a language for the
valorization of technology, with in the end a greater chance that
technology is turned into value creating offerings.
Chapter 15 A Standalone Digital Music Vending
Service
In this chapter, we apply the STOF model and method to a case that involves
a digital music vending service, called ‘MusicBox’, in a newly industrialized
country. The service uses store locations where users can obtain digital
music from digital music vending machines. The service enables users to
make use of mobile devices like MP3 players, telephones and the like to
listen to popular music. We used the STOF model as a prescriptive
framework. Accordingly, the present chapter addresses the following
question: Can the STOF model and method be used as a framework for
designing a digital music vending service and underlying business model?
The analysis is based on the first two phases of the dynamic business model,
i.e. the conceptualization of the first ideas, and the initial market trials.
15.1 MusicBox
As a result of numerous technological innovations, the global music industry
has changed considerably over the past decade. While the sales of music
based on physical media, i.e. CD and cassette, have fallen, the consumption
of digital music in the markets of developed countries has increased. The
key factors with regard to this increase include affordable broadband access
via Internet, an abundance of ripped digital music, a sufficiently high PC
penetration, and low prices of portable music players. However, in the
country under study – a newly industrialized country – the density of PCs is
low and the penetration of broadband facilities is almost zero.
In an attempt to overcome the absence of these two key factors, a specific
company is developing MusicBox, the main goal of which is to offer digital
music to consumers by setting up digital music vending units (kiosks),
bypassing traditional PCs and the need for broadband Internet access.
Consequently, MusicBox provides the ‘on-the-go’ experience in a newly
industrialized country. As a result, its value proposition is to enable end-
users to purchase and download high quality original digital content legally,
254 H. Bouwman, M. De Reuver, and H. Schipper
The STOF model and method guide the stages of definition of requirements
and assumptions, as well as determining structural preferences. The design
method explicitly addresses questions regarding the four domains and takes
into account Critical Design Issues (CDIs) as well as Critical Success
Factors (CSFs) related to creating customer and network value (Chaps. 3 and
5). To provide answers, one can cluster the questions based on potential data
sources, such as consumers, the own organization or specific partners. Such
clustering is akin to defining the kind of requirements or assumptions with
which certain questions deal, i.e. functional, user-related or context-related.
After that, one needs to formulate specific tasks and indicate how the
necessary answers will be generated, e.g. through interviews, market
research or desk research. The answers are formulated in final deliverables
or business model elaborations, which eventually provide insight into
possible ways of formulating the business model as well as the critical
design issues. In addition, deliverables lead to structural specifications,
which cover earlier specified requirements and assumptions. Figure 15.1
contains an overview of the various steps in the design process that was used
in the case of the MusicBox service.
Although the figure presented above suggests that designing a business
model consists of consecutive phases, it is actually a continuous iterative
process. To obtain initial input for the MusicBox business model, we
began by conducting interviews and discussions with partners, which
resulted in a first sketch of the business model, comparable to the result of
the quick-scan described in Chap. 5. Considering this initial sketch, the use
of the STOF model made it possible to identify the business model’s ‘blind
spots’, i.e. the CDIs help identify the data needed to arrive at sensible
business model design choices. Market research, and the way to define
a correct marketing strategy, could be useful. Gathering information
256 H. Bouwman, M. De Reuver, and H. Schipper
Organisation
STOF Questions
model Consumers
Technology
Within the service domain, the Value Proposition is the central issue. The
value proposition of MusicBox defines its intended value. Any innovative
service such as MusicBox can only be successful when it addresses market
needs and manages to realize sufficiently high levels of adoption.
Therefore, the service domain of the business model specifically focuses
on end-user value aspects (CDIs), such as Targeting, Creating Value
Elements, Branding and Customer Retention. Needless to say, the specific
characteristics of the MusicBox have to be taken into account. One of the
issues has to do with the location of MusicBox, which will significantly
contribute to the value of the service. In addition, the issue of piracy is a
typical characteristic of the music industry in industrializing countries.
258 H. Bouwman, M. De Reuver, and H. Schipper
Table 15.1. CDIs with regard to the MusicBox service in the Service domain
Critical design Balancing Present in Notes
issue requirements MusicBox
Targeting Generic vs. niche ++ Based on disposable income,
service high-tech services mainly
consist of niche services
Location Widespread vs. ++ Because MusicBox requires a
selection dense deployment fixed location, the selection of
optimal locations is a CDI
related to the generic CDI
Accessibility for Customers
Creating value Technological ++ Based on disposable income,
elements possibilities vs. most services in this country
user needs and meet the needs and wishes of
wishes the end-user rather than
providing advanced techno-
logies, which is exactly the
case with MusicBox
Ease of use vs. A balancing requirement is
added value implied by ease of use vs.
added value. An increased
level of experience with
MusicBox could generate an
interest in additional features,
e.g. novice vs. experienced
user
Branding Distributor + Although the CDI of branding
(lifestyle or device is significantly different from
brand) vs. content that of mobile services,
brand branding is important for
creating value around the
service. However, because
branding ideally implies a
strong lifestyle brand, it has to
be a ‘core’ partner
Customer Customer ++ Because the NFC smartcard is
retention lock-in vs. a prepaid payment solution,
customer the card provides an initial
annoyance lock-in. However, balancing
was visible in the discussion
surrounding the marketing
strategy, and a choice was
made in favor of a loyalty
program to avoid customer
annoyance
Chapter 15 A Standalone Digital Music Vending Service 259
Table 15.2. CDIs for the MusicBox service in the Technology domain
Critical design Balancing Present in Notes
issue requirements MusicBox
Security Ease of use vs. 0 An important security issue
preventing abuse and with regard to digital content is
piracy piracy. However, because
adoption levels of DRM are
low in these countries, ease of
use is applicable
Quality of Quality vs. costs ++ The QoS balancing
service requirement is constantly
applicable. Accordingly,
Company A prefers quality
above costs and asserts that
end-users are willing to pay for
quality
System Flexibility vs. costs ++ System integration is a
integration continuous factor during the
design of the technical
architecture. Since technology
advances rapidly, flexibility is
very important for a service
like MusicBox. Also, the
service needs to be market
Chapter 15 A Standalone Digital Music Vending Service 261
Table 15.4. CDIs for the MusicBox service in the finance domain
Critical design Balancing Present in Notes
issue requirements MusicBox
Pricing Maximizing profits ++ Pricing is a highly
vs. creating market important critical design
share issue for the service.
Ultimately, the price of
content strongly influences
whether or not end-users
are willing to start adopting
the service
Division of Operational financial ++ All the partners invest
investments interest (ROI) vs. based on different reasons,
intangible benefits and they participate with
(options) dissimilar interests
Division and Costs-benefits ++ Two different mechanisms
valuation of costs valuation on level of for the valuation and the
and revenues network vs. cost- division of costs and
between network benefits for individual revenues are used. On the
actors partners core network level (tier-1)
division is characterized by
royalty sharing. For
individual suppliers (tier-2
and -3) fixed revenues are
agreed upon
contains the CDIs for the finance domain along with the preferred
requirements, as well as the degree to which these issues were present in
the MusicBox case (++ = strongly present to −− = not present at all). The
two generic CDIs for Division of Costs and Revenues, and Valuation of
Contributions and Benefits, respectively, are taken together.
The CDIs for the finance domain are all ‘strongly present’ in the case of
MusicBox. However, the Division and Valuation of Costs and Revenues
between the network actors indicates different design choices on the
different network levels. At the level of the core partners (tier-1), revenue
sharing is the preferred choice. At the level of individual suppliers (tier-2
and -3), fixed revenues are agreed.
For a business model to be viable, the service needs to generate enough
revenues. For a stable business model, it is also important to ensure that
costs, risks, and investments are divided in such a way as to be acceptable
to all parties involved. Keeping the critical success factors in mind that
were discussed in Chap. 3, this means that the service should be profitable
266 H. Bouwman, M. De Reuver, and H. Schipper
15.8 Conclusion
The STOF model proved to be useful for designing the MusicBox service
and the underlying business model. The STOF model and method make it
possible to structure the complex set of issues that have to be dealt with
when designing a service. It proved to be a practical framework for
creating insight into the various issues and interdependencies. In this
chapter, we presented a typical way to apply the STOF model and method.
In the case of MusicBox, a digital service to be introduced in a newly
industrialized country, the STOF model and method provide clear
guidelines with regard to the first phase of business model design, i.e. the
phase that deals with the design on paper. As a result, the guidelines cover
most of the important generic issues, components and choices. In addition,
based on the guidelines it is possible to create an overview of the various
components of a service business model. Furthermore, the STOF model
helps gain insight into the interdependencies between the various
components, making it possible to understand the influence that a decision
involving one component has on other components or even domains.
Therefore, it becomes easier to see how the business model should be
adapted to accommodate changes in, for example, the target group, service
location or geographic region. In addition, the STOF model helps us
understand the scale dimension, and provides support when switching to a
different revenue model or new technology. Because the STOF model
addresses broad and generic issues, the approach is applicable to various
services.
Chapter 15 A Standalone Digital Music Vending Service 267
In this case there was a need to interact with various layers within the
organization. The STOF method does not provide explicit guidelines for
such situations. Typically, the STOF method is applied to situations
involving people who operate at the same organizational level. Applying
the method at lower levels is too complex, in which case developing
detailed process models for a specific area is an obvious approach.
Targeting is one of the critical design issues with regard to the service
domain. As far as MusicBox was concerned, it was important to have a
subdivision in segmentation and targeting, which leads to a more dynamic
approach. Because defining the target group involves making a static
observation at a particular moment, market segmentation makes it possible
to plan the best way to roll out a service. In addition, including more
guidelines on customer (end-user) acquisition and typical interdependencies
within the various STOF domains could improve the prescriptive value of
the model. Other issues that turned out to be relevant to MusicBox and are
not included in the STOF model have to do with selection of locations and
end-user education.
Chapter 16 From Prototype to Exploitation:
Mobile Services for Patients with
Chronic Lower Back Pain
Many research and development projects that are carried out by firms and
research institutes are technology-oriented. There is a large gap between
research results, for instance in the form of prototypes, and the actual
service offerings to customers. This becomes problematic when an
organization wants to bring the results from such a project to the market,
which will be particularly troublesome when the research results do not
readily fit traditional offerings, roles and capabilities in the industry, nor
the financial arrangements.
In this chapter, we discuss the design of a business model for a mobile
health service, starting with a research prototype that was developed for
patients with chronic lower back pain, using the STOF model and method.
In a number of design sessions, an initial business model was developed
that identifies critical design issues that play a role in moving from
prototype toward market deployment. The business model serves as a
starting-point to identify and commit relevant stakeholders, and to draw up
a business plan and case.
This chapter is structured as follows. We begin by discussing the need
for mobile health business models. Next, the research and development
project on mobile health and the prototype for chronic lower back pain
patients are introduced, after which the approach used to develop the
business model is described, followed by a discussion of the developed
mobile health business model for each of the STOF domains. We conclude
with a discussion regarding the lessons that were learned with respect to
the development of a business model on the basis of a prototype.
270 E. Fielt, R. Huis In’t Veld, and M. Vollenbroek-Hutten
Fig 16.1. Schematic presentation of the service concept for chronic lower back
pain patients (Van Weering et al., 2007)
Based on the prototype, a business model was developed that was aimed at
mobile health services for chronic back pain patients (Huis In’t Veld, Fielt,
Faber, & Vollenbroek-Hutten, 2007). The business model should increase
our understanding and enhance the viability of the mobile health service. A
business model can help moving a service from the research phase toward
the implementation phase, and serve as a basis for a business plan and
business case as explained in Chap. 2. This is particularly relevant for
RRD because of their explicit objective to implement their knowledge in
rehabilitation practice and the development of rehabilitation products.
To develop the business model, the STOF model and method were used.
This chapter presents the development of the initial business model from
an internal project-oriented view. This initial model will be further
developed and improved with external stakeholders. To develop the initial
business model a sequence of six design workshops of about 2 h each was
organized between June and September 2007: two workshops for the
service domain, one for each of the other domains, and a wrap-up and
integration workshop to conclude the development.
The workshop participants were RRD members (both researchers and
staff), since RRD is the primary stakeholder for the business model
development, extended with researchers of the Awareness project. The
participants came from different backgrounds, including physiotherapy,
technology, finance and management. For financial knowledge a person
from a Dutch insurance company was invited. Each workshop started with
an update of the business model as it has been developed so far. Whenever
it was deemed necessary, open issues that arose during a workshop were
investigated in greater depth afterwards.
Chapter 16 Mobile Services for Patients with Chronic Lower Back Pain 273
Tele-treatment Tele-alarm
Tele-consultation Tele-community
Tele-monitoring
An obvious target group for the chronic lower back pain application
consists of patients with chronic lower back pain and the professionals
who treat them, such as physiotherapists. However, it makes sense to
identify other potential markets in order to increase the overall market size.
This creates opportunities to (partially) leverage the investment in the
application and infrastructure and to mitigate the risks when the
acceptance levels of the service or the cooperation of the stakeholders in
this market turn out to be disappointing. An additional target group
consists of employees with lower back problems and the occupational
health providers responsible for their treatment. Since the prototype
focuses on influencing activity patterns, a third target market was defined
that consists of consumers with obesity, hence focusing on the wellness
market as well. In this market, the activity pattern can also be an important
part of the treatment.
The three target groups were selected because of their similarities
concerning monitoring and treatment. However, there are also differences
as far as this particular service is concerned. For example, patients and
employees have a higher need for increasing the range of sensing (e.g.,
physical condition, hearth rate) and require more frequent and detailed
feedback. Together, these three markets cover the individual and business
segments of the healthcare market as well as the consumer market. These
markets differ with respect to the organizational settings and financial
arrangements, as we will see when we discuss the other domains.
Specific attention in the service domain description was paid to an
idealized, future context-of-use for mobile health services. This involved
covering a range of wellness and healthcare issues via ‘plug and play’
sensors and services with one central device and tailored to the person and
context-of-use. Preferably, the device is someone’s own mobile phone.
While the chronic lower back pain application is still far removed from
this ideal future, it is very important to take the ease-of-use for the patient
into account.
human
computer
training and support (both end-user and health service provider), and
stimulating research and development for tele-health services.
The tele-health service-provider can perform fewer activities when the
activities are or become available as services in the market, for example
via partnering with an existing tele-health service-provider. The tele-health
service-provider can also perform more activities related to service
delivery and system integration, discussed in the supply-side roles. The
exact activities of the tele-health service provider will depend on the kind
of actor playing that role and the strategic choices of that actor, as later
discussed in the start-up scenarios.
The demand-side roles vary for each potential target market. The end-
users are the patients, employees and/or individuals suffering from obesity
(consumers). As far as chronic pain is concerned, a health provider
(a health professional or health organization) is involved, while in the case
of obesity agents (e.g. fitness centers) and direct service sales and delivery
offer alternatives. With regard to work-related health, an occupational
health provider is involved. The (occupational) health provider integrates
the tele-health service into the overall health service involving chronic or
work-related lower back pain. Moreover, a tele-health portal, acting as a
single source for different tele-health services, can be involved, offering,
for example, neck shoulder pain tele-health next to lower back pain. The
distribution choices will affect the activities of the tele-health service
provider, such as marketing and sales and training and support.
With regard to the supply-side roles, we separate the service delivery
from the system integration. The tele-health service provider has to arrange
the actual service delivery with a tele-health platform operator and with
data, communication, and context service providers. As far as the platform
and device are concerned, system integrators are needed, who use software
and hardware suppliers, and (medical) R&D organizations. With regard
to the roles of hardware and software supplier, it may be useful to
differentiate between those that provide hardware and software that is
specific to the tele-health service and those that provide hardware and
software that is more generic in nature, for instance mobile service
platforms or personal devices.
One of the major issues is the question as to who will be the central
actor playing the new role of tele-health service provider (and portal). We
present four possible start-up scenarios:
For each of the scenarios the central role is allocated to an actor willing
to invest in a new enterprise. These investment issues are discussed in the
finance domain).
16.4 Conclusion
In this chapter, we illustrated the use of the STOF model and method to
develop a mobile health business model starting from a prototype aimed at
patients with lower back pain. The STOF model and method helped
preparing and conducting the workshops, and organizing and presenting
the results (Huis In’t Veld et al., 2007). The presentation of the results in a
feedback session to the project members gave the impression that the
model and method address relevant issues in a systematic way. We
experienced that organizing separate workshops for each of the domains
provides more time for discussion, although it also makes it harder for the
participants to get an overall picture (due to the time that elapses between
workshops) and feel committed to the overall result (due to changing
participants per workshop). Therefore, it may be advisable to start with an
overall workshop, before moving on to separate workshops for the
individual domains.
The development of the business model resulted in a change from a
focus on the technology toward an overall picture that including the
service, organization and finance domains. Moreover, it resulted in a
Chapter 16 Mobile Services for Patients with Chronic Lower Back Pain 281
rethinking of the technology choices that were made while developing the
prototype. The service domain opened up the discussion regarding a use of
application to serve other target groups and to take additional services into
account. It also became clear that there is a need for a more concrete and
elaborated description of the service, and that this requires more
interaction with and knowledge about the target markets. The organization
domain draws attention to the new role of the tele-health service provider
and the need for a new or existing actor to take up this role. In addition, the
organization domain makes it clear that the initiative requires a complex
organizational network that depends on the cooperation of multiple
stakeholders with different interests and capabilities. While in general
there is agreement that e-health services are needed to keep providing
healthcare to a growing population with the same number of fewer health
professionals, the finance domain showed that the revenues and costs are
not yet very clear. Moreover, the distribution of the revenues and costs
among the various actors remains an important issue that needs to be
resolved.
The development of the business model also resulted in rethinking the
technology choices that were made with regard to the prototype. The
existing prototype is a high-end solution that may not be suitable for
commercial exploitation, at least not with regard to the basic service or in
the near future. The amount and prices of the devices and sensors in the
Body Area Network have to be reconsidered, as has the need for mobile
communication and context-awareness. Moreover, whether or not
technology is a potential barrier for the introduction of mobile health
services (e.g. power consumption) also depends on the ambitious claims
that have been made about the possibilities for continuous and real-time
tele-monitoring.
Chapter 17 From Prototype to Exploitation:
Organizational Arrangements for
a Personalized Dementia Directory
17.1 Introduction
successful pilots never reach this stage. The step from prototype to market
introduction is a big one. Common reasons for projects not to reach the
market are that there is no (commercial) party to take the lead in the
exploitation phase. Often the aim of these projects is to solve a societal
problem, with a variety of providers involved and with users as well as
society as a whole benefiting. However, in those cases it is not clear what
the benefits are and what the benefits are for the specific provider(s) and
the provisioning network as a whole. Among the specific problems in
healthcare are how to comply to regulation and to the complex financial
structure. As far as the development of exploitation models is concerned,
this poses a challenge. A first step towards market introduction is to
involve providers and take the providers’ interests into account as early as
in the design phase. The STOF model and method provide the ingredients
needed to realize this, taking into account the interests of the users as well
as the providers.
In this chapter we use a Personalized Dementia Directory (PDD) as an
example. This PDD provide personalized information on services that
fulfill the specific needs of a dementia patient. In the following section, we
explain the PDD and specific aspects of business models in the healthcare
domain. After that, we outline the research approach and assess alternative
business models that refer to the value for providers. This chapter is based
on the work by De Vos, Haaker, and Moen (2007). Note that PDD is not a
service using mobile technology. However, we experienced that the STOF
model and method can also be applied to other types of (electronic)
services, especially when multiple parties are involved in the provisioning
network, such as the case for PDD.
Baida, Gordijn, Sale, Akkermans, and Morch (2005) and Dröes et al.
(2005). User studies showed that people with dementia and their carers
require specific support to help them cope with the consequences of the
disease, especially with memory problems and problems in their daily
activities. However, variation, fragmentation and continuous changes in
care and welfare services make it (more) difficult to access the services.
By offering an improved access to optimal care, PDD is expected to
improve service usage and with it the quality of life of people with
dementia and their carers. Although as yet no specific impact figures are
available, it is expected that PDD will reduce the costs per patient-carer
dyad. Enabling people with dementia and carers to access and benefit from
the services they need, will prolong the period that people with dementia
can continue to live in their own homes and delay institutionalization, and
it will prevent the carer from becoming overburdened. From a societal
point of view, the cost reduction involved is important in the long term,
because dementia is a relatively costly disease and the number of people
with dementia is expected to increase dramatically in decades to come
(Lamura, 2003; Qiu, De Ronchi, & Fratiglioni, 2007).
The core research of PDD focuses on the service and technology
domain. The domain descriptions are provided below. Next, some generic
issues will be addressed with regard to the organization and finance
domain.
s3 s4 s1
respons s2
request
Informal carers
s3
Available Service
request Social chart
services provisioning
Matching needs s4
with services
s4 respons …
Healthcare
professionals
respons
request
s2 s5 s9
Elderly suffering
from dementia
Service Service Service
Users offering engine Services providers
The technology domain was specified together with the service design,
starting with the main challenge: an engine – algorithm – that could
translate user needs into specific demands and match these demands with
the available (service) information packages (or bundles) (Baida et al.,
2005). A domain expert was involved to specify the information supply
and to define the range of needs that should be dealt with by PDD. Next,
a user interface was developed and small scale user tests were conducted
to adjust the prototype to the specific requirements of users. The global
technical PDD architecture is outlined in Fig. 17.2, with the user and
research roles and their activities at the top, e.g. informal carers that
determine user needs, receive service bundles and determine the context,
and several domain experts that classify needs, specify regulations and
consequences, and specify specific aspects of the services. Roles and
activities are linked to system functionality and information at the bottom
of the architecture. System functionalities are e.g. the engine that matches
supply and demand, and several administrative functions that support
the experts in their specification activities. For an explanation of the
Archimate notation, we refer to Lankhorst (2005).
Chapter 17 Organizational Arrangements for a Personalized Dementia Directory 287
Context Needs
information classification Services
Resources
Service
dependencies Regulations
Research prototype
Service Technology
domain domain
Business model
Service
domain
Technology Organisation
domain domain
Finance
domain
The business models were used as input for the discussions with
stakeholders, in rounds of interviews and workshops. Since the research
was relatively explorative in nature, a limited number of stakeholders were
involved.
Stakeholder Interviews. There are numerous stakeholders with regard to
PDD, ranging from care and welfare providers to government institutions,
insurance companies and interest group, such as informal care communities
aimed at supporting informal carers and patient organizations. In principle,
all the participants in the study could become part of the future PDD
providing network. In all, we interviewed 14 stakeholder representatives,
using a semi-structured interview protocol. The questions focused on options
for financial and organizational structures for PDD, and addressed issues
such as the pros and cons of alternative business models and potential
tangible and intangible benefits for the organizations involved.
The first series of interviews with twelve stakeholders provided insight
into PDD’s expected customer value, as well as into the preferred business
models and potential value for providers. An in-depth evaluation of the
perceived business model viability was performed in a second series
of two workshops and four additional interviews with stakeholder
representatives. In this second round, we used the Analytic Hierarchy
Process (AHP) introduced by Saaty (1980) to support evaluation of the
business model alternatives. As a result, the workshop participants were
able to select their optimal business model for PDD. In all, nine people
took part in the second round.
Choosing Between Alternative Business Models. After scanning relevant
existing literature, we found several approaches that can be used to select
business models. Weiss and Amyot (2005), for example, use a goal-
oriented requirement language to compare alternatives in terms of their
impact on profitability and risk. The authors apply this method to evolving
business models. Barabba et al. (2002) use a formal process for decision-
makers and supported decisions, combining various approaches from
management science, e.g. conjoint analysis, system dynamics models.
These approaches require a fairly detailed knowledge regarding several
aspects of the business models, which at the time the PDD case was being
developed we did not possess. We therefore used a light weight approach
by applying the AHP technique to compare alternative business models,
and used evaluation criteria derived from the business model success
factors of the STOF model.
The AHP technique for multi-criteria decision support was designed by
enables users to build a hierarchy with relevant criteria and sub-criteria.
Alternatives are evaluated with respect to the goal by pair-wise
comparisons. A final judgment is achieved by weighing the subsequent
290 H. De Vos, T. Haaker, and R.-M. Dröes
17.4 Results
During the interviews, all the stakeholders confirmed the value of PDD for
people with dementia and their carers. Currently, it is very difficult for
these patients and their carers to find the services they need in time,
with all consequences, including problems in daily functioning, unsafe
situations, accidents, overburdened carers and premature admission into
nursing homes. PDD fits into a modern society where people are used to
make their own choices. The stakeholders furthermore stated that PDD
would be a valuable tool for professionals and healthcare consultants, since
they also lack a proper overview of available services. This implies
potential new target groups in the service domain. Since PDD helps people
find services, it should also be able to reflect which services are missing
and where market opportunities arise. However, focusing solely on
dementia did not fit with the strategies of the care providers, who offer
their services to customers with various diseases and disabilities.
Within the four business model domains, a variety of design issues was
addressed. For example, stakeholders stressed the importance of the
quality of information (service domain) and provided suggestions with
regard to implementation, like asking feedback from users, and striving for
a uniform way of presentation. Within the organization domain, issues like
maintaining an organization’s identity were important, which may conflict
with the requirement mentioned above. With regard to the financial aspects
of PDD, care providers were reluctant to invest in such a system. They
stressed the importance of finding a balance in contribution and returns.
Next to a general reflection regarding the opportunities and potential value
of PDD, several business models for exploitation were discussed with the
stakeholders.
Chapter 17 Organizational Arrangements for a Personalized Dementia Directory 291
A general role model or value network for PDD is visualized in Fig. 17.4.
The PDD provider, responsible for providing the PDD service to the users,
and for maintaining the service, occupies a central position in this model.
Providers of care and welfare services, ranging from taxi services and
housekeepers to medical care and cure, are responsible for providing
accurate, up-to-date information regarding their services. Information
providers are responsible for providing general information, like
information on dementia. Advertisers and sponsors may share revenues
with the PDD provider in exchange for advertising or marketing
opportunities. Finally, there is the user, in most cases the informal carer or
a person with dementia.
Advertiser Sponsor
Care or wellfare
service provider
DEM-DISC
User
service provider
Information
service provider
0,6
0,4
Importance
0,2
0,0
Acceptable division Clear network Quality of Acceptable division
of profits strategy information of roles
0,4 0,4
0,2 0,2
0,0 0,0
Commercial Community Government Provider Commercial Community Government Care provider
model model model model model model model model
Fig. 17.6. Business model assessments by AHP for care providers and others
17.5 Conclusion
In this chapter we illustrated the use of the STOF method to move from a
user-centered research prototype (i.e. mainly service and technology
domain) towards a design that involves the needs and requirements of the
potential providers. Ideally, the supply side would be included in a
Chapter 17 Organizational Arrangements for a Personalized Dementia Directory 295
Bergman, S., Frissen, V. A. J., & Slaa, P. (1995). Gebruik en betekenis van de
telefoon in het leven van alledag (Use and meaning of telephone in daily life).
In Toeval of noodzaak: Geschiedenis van overheidsbemoeienis met de
informatievoorziening (Co-incidence or necessity: History of government
occupation in information provisioning) (pp. 277–327). Den Haag: Rathenau
Instituut
Berry, L., Shankar, V., Parish, J., Cadwallader, S., & Dotzel, T. (2006). Creating
new markets through service innovation. MIT Sloan Management Review,
Winter, 56–63
Blazevic, V., Lievens, A., & Klein, E. (2003). Antecedents of project learning and
time-to-market during new mobile service development. International Journal
of Service Industry Management, 14(1), 120–147
Bohlin, E., Lindmark, S., Rodríguez, C., & Burgelman, J.-C. (2006). Mapping
European wireless trends and drivers. Brussels: European Commission
Booz-Allen, & Hamilton. (1982). New product management for the 1980s. New
York: Booz-Allen & Hamilton
Borst, P. (1997). Construction of engineering ontologies for knowledge sharing
and re-use. Enschede, The Netherlands: University of Twente
Boswijk, A., Thijssen, T., & Peelen, E. (2005). Een nieuwe kijk op de experience
economy: Betekenisvolle belevenissen (A new view on experience economy:
Meaningful experiences). Upper Saddle River, NJ: Pearson
Bouwman, H. (2004). Anywhere, anytime, anyplace or here and now in this
context: Third generation mobile services: A Vignet-study. Paper presented at
the 54th annual conference of the ICA
Bouwman, H., & MacInnes, I. (2006). Dynamic business model framework for
value webs. Paper presented at the 39th annual Hawaii international
conference on system sciences, Big Island, Hawaii, January 4, 2006–January
7, 2006
Bouwman, H., & Van Den Ham, E. (2003a). Exploring value networks enabling
the delivery of back office content to mobile workers. Paper presented at the
ITI’03 Europrix conference, Tampere
Bouwman, H., & Van Den Ham, E. (2003b). Business models and emetrics,
A state of the art. In B. Preissl, H. Bouwman, & C. Steinfield (Eds.), Elife
after the Dot.com bust (pp. 609–618). Berlin Heidelberg New York: Springer
Bouwman, H., & Van der Duin, P. (2003). Technological forecasting and
scenarios matter: Research into the use of information and communication
technology in the home environment in 2010. Foresight, 5(4), 8–20
Bouwman, H., Carlsson, C., Molina-Castillo, F., & Walden, P. (2007). Barriers
and drivers in the adoption of current and future mobile services in Finland.
Telematics and Informatics, 24(2), 145–160
Bouwman, H., Carlsson, C., Molina-Castillo, F. J., & Walden, P. (2008). Trends
in mobile services in Finland 2004–2006: From ringtones to mobile internet.
Info, 10(2), 75–93
Bouwman, H., De Vos, H., Faber, E., Haaker, T., Kijl, B., Eldin, A., et al. (2005).
Dynamic provisioning of service bundles: A state of the art. Enschede, The
Netherlands: Freeband, Telematica Instituut
304 References
Bouwman, H., Faber, E., & Haaker, T. (2004). Balancing strategic interests for
network value of mobile services. Paper presented at the 10th AMCIS
conference, New York
Bouwman, H., Faber, E., & Haaker, T. (2005). Designing business models for
mobile service bundles. Paper presented at the Hong Kong mobility
roundtable, Hong Kong
Bouwman, H., Faber, E., & Van Der Spek, J. (2005). Connecting future scenario’s
to business models of insurance intermediaries. Paper presented at the 18th
Bled ecommerce conference E integrity, Bled, Slovenia
Bouwman, H., Haaker, T., & De Vos, H. (2005). Designing 3G+business models:
A practical approach. Paper presented at the 26th McMaster world congress,
Hamilton, Canada
Bouwman, H., Haaker, T., & De Vos, H. (2007). Mobile service bundles: The
example of navigation services. Electronic Markets, 17(1), 28–38
Bouwman, H., Haaker, T., Steen, M., & De Vos, H. (2003). The value proposition
from the end user perspective as main driver for creating complex business
models. Paper presented at COST 269, Helsinki, Finland
Bouwman, H., MacInnes, I., & De Reuver, M. (2006). Dynamic business model
framework: A comparative case study analysis. Paper presented at ITS 2006 –
16th biennial conference, Beijing, China
Bouwman, H., Staal, M., & Steinfield, C. (2001). Klantenervaring en internet
concepten. (Consumer experience and internet concepts). Management &
Informatie, 9(6), 52–60
Bouwman, H., Van De Wijngaert, L., & De Vos, H. (2008). Context-sensitive
mobile services for police officers. Accepted for: International Conference on
M-business. Barcelona, Spain. July 6–8
Bouwman, H., Van Den Hooff, B., Van De Wijngaert, L., & Van Dijk, J. (2005).
Information & communication technology in organizations. London: Sage
Boyd, C., & Jacob, K. (2007). Mobile financial services and the under-banked:
Opportunities and challenges for M-banking and M-payments. Chicago, IL:
The Center for Financial Service Information
Braet, O., & Ballon, P. (2007). Strategic design issues of IMS versus end-to-end
architectures. Info, 9(5), 44–56
Brandenburger, A., & Nalebuff, B. (1996). Co-opetition. New York: Currency/
Doubleday
Broens, T. H. F., Huis In’t Veld, R. M. H. A., Vollenbroek-Hutten, M. M. R.,
Hermens, H. J., Van Halteren, A. T., & Nieuwenhuis, L. J. M. (2007).
Determinants of successful tele-medicine implementations: A literature study.
Journal of Tele-Medicine and Telecare, 13(6), 303–309
Brynjolffson, E., Yu, H., & Smith, M. (2006). From niches to riches. The anatomy
of the long tail. Sloan Management Review, 47(4), 67–71
Buijs, J. (1984). Innovation and intervention. Deventer: Kluwer
Buijs, J., & Valkenburg, R. (1996). Integrale Productontwikkeling (Integral
product development). Utrecht, The Netherlands: Lemma
Burgelman, R. A. (1983). A process model of internal corporate venturing in the
diversified major firm. Administrative Science Quarterly, 28(2), 223–244
References 305
Camponovo, G., & Pigneur, Y. (2003). Business model analysis applied to mobile
business. Paper presented at the 5th international conference on enterprise
information systems, Angres
Carlson, R. (1996). The information super highway. Strategic alliances in
telecommunications and multimedia. New York: St Martin Press
Carlsson, C. (2006). Special issue on mobile technology and services. Electronic
Commerce Research and Applications, 5(3), 189–191
Castells, M. (1996). The information age: Economy, society and culture. Volume 1
The rise of the network society. Cambridge MA: Blackwell
Chen, Z., & Dubinsky, A. (2003). A conceptual model of perceived customer
value in E-commerce: A preliminary investigation. Psychology & Marketing,
20(4), 323–347
Chesbrough, H. (2003). Open innovation: The new imperative for creating and
profiting from technology. Boston: Harvard Business Press
Chesbrough, H., & Rosenbloom, R. S. (2002). The role of the business model in
capturing value from innovation: Evidence from xerox corporation’s
technology spin-off companies. Industrial and Corporate Change, 11(3),
529–555
Chesbrough, H., Vanhaverbeke, W., & West, J. (Eds.). (2006). Open innovation:
Researching a new paradigm. Oxford, UK: Oxford University Press
Chiasson, G. (1999). Bundle of joy. Telephony, 237(23), 42–46
Chlamtac, I., Conti, M., & Liu, J. J.-N. (2003). Mobile ad hoc networking:
Imperatives and challenges. Ad Hoc Networks, 1(1), 13–64
Christensen, C. M. (1997). The innovator’s dilemma. When new technologies
cause great firms to fail. Boston: Harvard Business School
Clark, G., Johnston, R., & Shulver, M. (2000). Exploiting the service concept for
service design and development. In J. Fitzsimmons & M. Fitzsimmons (Eds.),
New service develop (pp. 71–91). Thousand Oaks, CA: Sage
Clausing, D. P. (1994). Total quality development: A step-by-step guide to world-
class concurrent engineering. New York: ASME Press
Cristiano, J., Liker, J. K., & White, C. C., III. (2000). Customer driven product
development through quality function deployment in the US and Japan.
Journal of Product Innovation Management, 17(4), 286–308
Cross, N. (1994). Engineering design method: Strategies for product design.
Chichester: Wiley
Cuevas, A., Moreno, J. I., Vidales, P., & Einsiedler, H. (2006). The IMS service
platform: A solution for next-generation network operators to be more than bit
pipes. IEEE Communications Magazine, 44(8), 75–81
Curtis, B., Kellner, M., & Over, J. (1992). Process modeling. Communications of
the ACM, 35(9), 75–90
Cushnie, J., Hutchison, D., & Oliver, H. (2000). Evolution of charging and billing
models for GSM and future mobile internet services. Berlin Heidelberg New
York: Springer
Dahlberg, T., Mallat, N., Ondrus, J., & Zmijewska, A. (2007). Past, present and
future of mobile payments research: A literature review. Electronic
Commerce Research and Applications (in press)
306 References
Das, T. G., & Teng, B. S. (1998). Resources and risk management in the strategic
alliance making process. Journal of Management, 24(1), 21–42
Davenport, T. (1993). Process innovation: Reengineering work through
information technology. Boston: Harvard Business School Press
Davis, F. D. (1989). Perceived usefulness, perceived ease of use, and user
acceptance of information technology. MIS Quarterly, 13(3), 319–340
Deitel, H. M., Deitel, P. J., & Nieto, T. (2001). e-Business & e-commerce. How to
program. Upper Saddle River, NJ: Prentice-Hall
Deitel, H. M., Deitel, P. J., & Steinbuhler, K. (2001). e-Business & e-commerce
for managers. Upper Saddle River, NJ: Prentice-Hall
Delaere, S., & Ballon, P. (2007). The business model impact of flexible spectrum
management and cognitive networks. Info, 9(5), 57–69
Demkes, R. (1999). COMET: A comprehensive methodology for supporting
telematics investment decisions. Enschede: Telematica Instituut
Den Hertog, P. (2000). Knowledge-intensive business services as co-producers of
innovation. International Journal of Innovation Management, 4(4), 491–528
De Reuver, M., Bouwman, H., & MacInnes, I. (2007). What drives business model
dynamics? A case survey. Paper presented at the 8th world congress on the
managment of ebusiness, Toronto, Ontario, Canada
De Reuver, M., Haaker, T., & Bouwman, H. (2007). Business model dynamics:
A longitudinal, cross-sectional case survey. Paper presented at the 20th Bled
econference, Bled, Slovenia
De Vos, H., Haaker, T., Kleijnen, M., & Teerling, M. (2008). Context-aware and
location based mobile services and consumers’ perceived value. Paper
submitted to ECIS 2008
De Vos, H., Haaker, T. I., & Moen, S. (2007). How to move from research
prototype to exploitation phase: The DEM-DISC case. In P. Cunningham &
M. Cunningham (Eds.), Expanding the knowledge economy (Vol. 4, pp. 615–
622). Amsterdam: IOS Press
Devlin, B., Gray, J., Laing, B., & Spix, G. (1999). Scalability terminology: Farms,
clones, partitions, and packs: RACS and RAPS. Retrieved February 5, 2008,
from Http://Arxiv.Org/Abs/Cs.AR/9912010
Dietz, J. L. G. (1996). Introductie to DEMO: Van Informatietechnologie Naar
Organisatietechnologie (Introduction to DEMO: From information technology
to organization technology). Alphen Aan De Rijn, The Netherlands: Samsom
Doherty, D., Glapa, M., Kamat, S., Magee, F., Prakash, S., & Ruffolo, D. (2004).
Balancing network and business planning for cable telephony. Paper
presented at the 11th international telecommunications network strategy and
planning symposium, Vienna, Austria
Droës, R. M., Meiland, F. J. M., Doruff, S., Varodi, I., Akkermans, H., Baida, Z.,
et al. (2005). A dynamic interactive social chart in dementia care: Attuning
demand and supply in the care for persons with dementia and their carers. In
L. Bos, S. Laxminarayan, & A. Marsh (Eds.), Medical and care compunetics
2 (pp. 210–220). Amsterdam: IOS Press
References 307
Drop, R., Dijkhuis, J., Van Der Duin, P. A., & Stavleu, H. (2000). Bestemming
2005: Corporate scenario’s voor KPN (Destination 2005: Corporate
scenarios for KPN). KPN Studieblad, April/May, 204–221
Dym, C., Agogino, A., Eris, O., Frey, D., & Leifer, L. (2005). Engineering design
thinking, teaching, and learning. Journal of Engineering Education, 94(1),
103–110
ECLAC. (2003). Road maps towards an information society in Latin America and
the Caribbean. Santiago, Chile: ECLAC
Edvardsson, B., Gustafsson, A., & Enquist, B. (2006). Success factors in new
service development and value creation through services. In D. Spath & K.-P.
Fähnrich (Eds.), Advances in service innovations (pp. 165–189). Berlin
Heidelberg New York: Springer
Estenfeld, K. (2006). Mobile business evolution. Paper presented at the CICT
conference, Copenhagen, Denmark
European Commission. (2003). The competitiveness of business-related services
and their contribution to the performance of European enterprises. Retrieved
January 23, 2008, from Http://Ec.Europa.Eu/Internal_Market/Services/Brs/
Competitiveness_En.Htm
European Commission. (2005). European monitoring centre on change. Retrieved
August, 2006, from Http://Eurofound.Europa.Eu/Emcc/Publications/2005/
Ef0567en.Pdf
Evans, P., & Wurster, T. (1999). Blown to bits: How the economics of information
transformsstrategy. Boston: Harvard Business School Press
Expert Choice. (2006). Expert choice 11. Retrieved January, 2008, from
Http://www.Expertchoice.Com/Software/
Faber, E., & Bouwman, H. (2003). Designing business models for mobile services.
Exploring the connections between customer value and value networks. Paper
presented at the ICEB 2003, Singapore
Faber, E., Ballon, P., Bouwman, H., Haaker, T., Rietkerk, O., & Steen, M. (2003).
Designing business models for mobile ICT services. Paper presented at the
16th Bled electronic commerce conference e-transformation, Bled, Slovenia
Faber, E., Haaker, T., Bouwman, H., & Rietkerk, O. (2003). Business models for
personalised real-time traffic information in cars: Which route to take. Paper
presented at the ICEC, Pittsburg
Fähnrich, K.-P., & Meiren, T. (2006). Service engineering: State of the art and
future trends. In D. Spath & K.-P. Fähnrich (Eds.), Advances in service
innovations (pp. 3–16). Berlin Heidelberg New York: Springer
Farley, P., & Capp, M. (2005). Mobile web services. BT Technology Journal,
23(2), 202–213
Feijóo, C., Marín, A. Á., Martín, Á., & Rojo, D. (2006). European regulation,
competition models and mobile content access. Paper presented at the CICT
conference, Copenhagen, Denmark
Fijnvandraat, M., & Bouwman, H. (2006). Flexibility and broadband evolution.
Telecommunication Policy, 30(8–9), 424–444
308 References
Fishbein, M., & Ajzen, I. (1975). Beliefs, attitude, intention and behaviour: An
introduction to theory and research. Reading, MA: Addison-Wesley
Forrester. (2006a). The European mobile landscape 2006
Forrester. (2006b). Towards an open mobile internet (Presentation for open
mobile internet initiative)
Foster, R., Daymon, C. M., & Tewungwa, S. (2002). Future reflections. Four
scenarios for television in 2012. Retrieved November, 2007, from
Http://Media.Bournemouth.Ac.Uk/Research/Documents/Fullreport.Pdf
Frodigh, M., Parkvall, S., Roobol, C., Johansson, P., & Larsson, P. (2001). Future-
generation wireless networks. IEEE Personal Communications, 8(5)(October),
10–17
Galbreath, J. (2002). Twenty-first century management rules: The management of
relationships as intangible assets. Management Decision, 40(2), 116–126
Gallouj, F., & Weinstein, O. (1997). Innovation in services. Research Policy,
26(4–5), 537–556
Giaglis, G. M. (2001). A taxonomy of business process modeling and information
systems modeling techniques. The International Journal of Flexible
Manufacturing Systems, 13(2), 209–228
Goldstein, S. M., Johnston, R., Duffy, J. A., & Rao, J. (2002). The service
concept: The missing link in service design research? Journal of Operations
Management, 20(2), 121–134
Gordijn, J., & Akkermans, H. (2001). E3-value: Design and evaluation of
E-business models. IEEE Intelligent Systems, 16(4), 11–17
Gordijn, J., Akkermans, H., & Van Vliet, H. (2000). Business modelling is not
process modelling. In S. W. Liddle & H. C. Mayr (Eds.), Conceptual
modeling for E-business and the web (pp. 40–51). LNCS 1921. Berlin
Heidelberg New York: Springer
Grace, D., & O’Cass, A. (2005). Service branding: Consumer verdicts on service
brands. Journal of Retailing and Consumer Services, 12(2), 125–139
Granovetter, M. (1994). Business groups. In N. J. Smelser & R. Swedberg (Eds.),
The handbook of economic sociology (pp. 453–475). Princeton: Princeton
University Press
Grant, R. M. (1991). The resource based theory of competitive advantage.
Implications for strategy formulation. California Management Review, 33(3),
114–135
Grönroos, C. (1992). Service management and marketing: Managing the moment
of truth in service competition. Lexington: Lexington books
Grönroos, C. (1994). From marketing mix to relationship marketing: Towards a
paradigm shift in marketing. Management Decision, 32(2), 4–20
Grönroos, C. (2000). Service management and marketing: A customer relation
management approach. New York: Wiley
Grönroos, C. (2007). Service management and marketing: Customer management
in service competition (3rd Ed.). Chichester: Wiley
Grönroos, C., Heinonen, F., Isoniemi, K., & Lindholm, M. (2000). The netoffer
model: A case example from the virtual marketspace. Management Decisions,
38(4), 243–252
References 309
Johnson, S. P., Menor, L. J., Roth, A. V., & Chase, R. B. (2000). A critical
valuation of the new service development process. In J. Fitzsimmons &
M. Fitzsimmons (Eds.), New service development (pp. 1–32). Thousand Oaks,
CA: Sage
Johnston, R. (1999). Service operations management: Return to roots. International
Journal of Operations & Production Management, 19(2), 104–124
Jonason, A., & Holma, B. (2002). Pricing for profits on the mobile internet. Paper
presented at the IEEE international engineering management conference
Jones, C., Hesterly, W., & Borgatti, S. (1997). A general theory of network
governance: Exchange conditions and social mechanisms. The Academy of
Management Review, 22(4), 911–945
Kaasinen, E. (2005). User acceptance of location-aware mobile guides based on
seven field studies. Behaviour and Information Technology, 24(1), 37–49
Kambil, A., & Short, J. (1994). Electronic integration and business network
redesign: A roles-linkage perspective. Journal of Management Information
Systems, 10(4), 59–83
Kaplan, R., & Norton, D. (1992). The balanced scorecard: Measures that drive
performance. Harvard Business Review, January–February, 71–79
Kaplan, R., & Norton, D. (1996). Using the balanced scorecard as a strategic
management system. Harvard Business Review, January–February, 75–85
Katz, M. L. (2002). Industry structure and competition absent distribution
bottlenecks. In E. Noam, J. Groebel, & D. Gerbarg (Eds.), Internet television.
Mahwah, NJ: Lawrence Erlbaum Associates
Kiiski, A. (2006). Impacts of MVNOs on mobile data service market. Paper
presented at the regional ITS conference, Amsterdam, The Netherlands
Kijl, B., & Timmerman, W. (2003). Presence and instant messaging: Cross case
analysis. Enschede: Telematica Instituut
Killström, U., Virola, H., Galli, L., Immonen, O., Pitkänen, O., & Kijl, B. (2006).
Business models for new mobile applications and services. Retrieved
February 27, 2008, from Http://www.ist-mobilife.org/ (D1.5)
Killström, U., Galli, L., Haaker, T., Immonen, O., & De Reuver (2007).
Marketplace dynamics and business models framework. In M. Klemettinen
(Ed.), Enabling technologies for mobile services: The mobilife book.
Chichester, UK: Wiley
Klein, S., & Loebbecke, C. (2003). Emerging pricing strategies on the web:
Lessons from the airline industry. Electronic Markets, 13(1), 46–58
Klein-Woolthuis, R. (1999). Sleeping with the enemy, trust and dependence in
inter organisational relationships. Enschede, The Netherlands: University of
Twente
Klemettinen, M. (Ed.). (2007). Enabling technologies for mobile services: The
mobilife book. Chichester, UK: Wiley
Konczal, E. F. (1975). Models are for managers, not mathematicians. Journal of
Systems Management, 26(1), 12–15
Koolwaaij, J., Tarlano, A., Luther, M., Morhs, B., Battestini, A., & Vaidya, R.
(2006). Contextwatcher – Sharing context information in everyday life. Paper
312 References
Ondrus, J., & Pigneur, Y. (2006). Towards a holistic analysis of mobile payments:
A multiple perspectives approach. Electronic Commerce Research and
Applications, 5(3), 246–257
O’Neill, P., & Sohal, A. (1999). Business process reengineering: A review of
recent literature. Technovation, 19(9), 571–581
Osterwalder, A., & Pigneur, Y. (2002). An e-business model ontology for
modelling e-business. Paper presented at the 15th Beld electronic commerce
conference, Bled, Slovenia
OVUM. (2006). Off-portal developments and operator strategy. London: OVUM
Panagiotakis, S., Koutsopoulou, M., & Alonistioti, A. (2005). Business models
and revenue streams in 3G market. Paper presented at the 14th IST mobile
and wireless communications, Summit, Dresden, Germany
Parasuraman, A., Zeithaml, V., & Berry, L. (1988). SERVQUAL: A multiple item
scale for measuring consumer perceptions of service quality. Journal of
Retailing, 64(1), 168–174
Pashtan, A. (2005). Mobile web services. Cambridge, UK: Cambridge University
Press
Petrovic, O., & Kittl, C. (2003). Capturing the value proposition of a product or
service. Paper presented at the international workshop on business models,
Lausanne, Switzerland
Pfeffer, J., & Salancik, G. (1978). The external control of organizations. A
resource dependence perspective. New York: Harper & Row
Pigneur, Y., (2004). An ontology for M-business models. Lecture Notes in
Computer Science, 2503/2002, 3–6
Pilioura, T., Tsalgatidou, A., & Hadjiefthymiades, S. (2003). Scenarios of using
web services in M-commerce. ACM Sigecom Exchanges, 3(4), 28–36
Pine, J., & Gilmore, J. (1999). The experience economy. Boston: Harvard Business
School Press
Porter, M. (1980). Competitive strategy. New York: The Free Press
Porter, M. (1985). Competitive advantage: Creating and sustaining superior
performance. New York: The Free Press
Porter, M. (1990). The competitive advantage of nations. London: The Macmillan
Press
Porter, M. (2001). Strategy and the internet. Harvard Business Review, March,
63–76
Porter, M., & Millar, V. (1985). How information gives you competitive
advantage. Harvard Business Review, 63(4), 149–160
Powell, M. W. (1990). Neither market nor hierarchy: Network forms of
organisation. Research in organisational behaviour, 12, 295–336
Power, A. (2000). Channel surfing. Outlook, January, 54–61
Qiu, C., De Ronchi, D., & Fratiglioni, L. (2007). The epidemiology of dementia:
An update. Current Opinion in Psychiatry, 20(4), 380–385
Raessens, B. (2001). e-Business your business. Over de effectiviteit van E-
commerce (E-Business your business. About the effectiveness of e-
commerce). Utrecht, The Netherlands: Lemma
References 317
Räisänen, V., Karasti, O., Steglich, S., Mrohs, B., Räck, C., Del Rosso, C., et al.
(2005). Basic reference model for service provisioning and general
guidelines. Helsinki: Mobilife
Ramaswamy, R. (1996). Design and management of service processes. Reading:
Addison-Wesley
Rappa, M. (2000). Business models on the web. Retrieved February 23, 2006,
from Http://Digitalenterprise.Org/Models/Models.Html
Rappa, M. (2001). Managing the digital enterprise – Business models on the
web. Retrieved October, 2007, from Http://Digitalenterprise.Org/Models/
Models.Html
Rayport, F. (1999). The truth about business internet business models. Strategy
and Business, 16(3rd Quarter), 1–3
Rayport, J. F., & Jaworski, B. J. (2001). e-Commerce. New York: McGraw-Hill
Rayport, J. F., & Sviokla, J. (1994). Managing in the market space. Harvard
Business Review, 72(6), 141–145
Rayport, J. F., & Sviokla, J. (1995). Exploring the virtual value chain. Harvard
Business Review, 73(6), 75–85
Recker, J., Indulska, M., Rosemann, M., & Green, P. (2005). Do process
modelling techniques get better? A comparative ontological analysis of
BPMN. Paper presented at the 16th Australian conference on information
systems, Sydney, Australia
Rendón, J., Kuhlmann, F., & Aranis, J. P. (2007). A business case for the
deployment of a 4G wireless heterogeneous network in Spain. Paper presented
at the 18th European international telecommunications society conference
(ITS), Istanbul, Turkey
Reneser. (2006). Research and development needs of business related service
firms. Utrecht: Dialogic
Renkema, T. (1996). Investeren in de Informatie-Infrastructuur. Richtlijnen voor
besluitvorming in organisaties (Investing in information infrastructure.
Guidelines for decision making in organisations). Deventer, The Netherlands:
Kluwer Bedrijfsinformatie
Rietkerk, O., & Timmerman, W. (Eds.). (2003). Communities of interest: Cross
case analysis. Enschede, The Netherlands: Telematica Instituut
Ritter, T., Wilkinson, I., & Johnston, W. (2002). Measuring network competence:
Some international evidence. Journal of Business & Industrial Marketing,
17(2–3), 119–138
Rockart, J., & Bullen, C., (1981). A primer on critical success factors. Cambridge,
MA: Sloan School of Management, MIT
Rogers, E. M. (1995). Diffusion of innovations. New York: Free Press
Rojas, E. (2005). The GSM evolution and the mobile revolution in Latin America.
Business briefings wireless technology. Retrieved February 5, 2008, from
Http://www.Touchbriefings.Com/Pdf/1433/Rojas.Pdf
Roland Berger. (2005). What’s the score on mobile data services? Amsterdam:
Roland Berger
Roussel, A., Daum, A., Flint, D., & Riseley, M. (2000). B2C web business
models: Winners and losers. Gartner Group Research
318 References
Simons, L., & Bouwman, H. (2004). Developing a multi channel service model
and design method. International Journal of Internet Marketing and
Advertisement, 1(3), 229–250
Simons, L., & Bouwman, H. (2005). Multi channel service design processes:
Challenges and solutions. International Journal of Electronic Business, 3(1),
50–67
Smith, A., Mitra, S., & Narasimhan, S. (1998). Information systems outsourcing:
A study of pre-event firm characteristics. Journal of Management Information
Systems, 15(2), 61–93
Stabell, C. B., & Fjeldstad, Ø. D. (1998). Configuring value for competitive
advantage: On chains, shops, and networks. Strategic Management Journal,
19(5), 413–437
Stähler, P. (2001). Gesellschäftsmodelle in Der Digitalen Ökonomie. Merkmale,
Strategien Und Auswirkungen (Business models for the digital economy.
Branding, strategies and consequences). St Gallen: University of St Gallen
Steen, M., Van Eijk, R., Gunther, H., Hooreman, S., & De Koning, N. (2005).
We-centric services for police officers and informal carers. Paper presented at
the HCI close to you: Sigchi.Nl conference, The Hague, The Netherlands
Strauss, B., Schmidt, M., & Schoeler, A. (2005). Customer frustration in loyalty
programs. International Journal of Service Industry Management, 16(3),
229–252
Stremersch, S., & Tellis, G. J. (2002). Strategic bundling of products and prices:
A new synthesis for marketing. Journal of Marketing, 66(1), 55–72
Tafazolli, R. (Ed.). (2005). Technologies for the wireless future. London: Wiley
Tanriverdi, H., & Iacano, C. S. (1998). Knowledge barriers to diffusion of tele-
medicine. Paper presented at the international conference on information
systems, Helsinki, Finland
Tanriverdi, H., & Iacono, C. S. (1999). Diffusion of tele-medicine: A knowledge
barrier perspective. Telemedicine Journal, 5(3), 223–244
Tapscott, D., Lowi, A., & Ticoll, D. (2000). Digital capital – Harnessing the
power of business webs. Boston: Harvard Business School Press
Tax, S. S., & Stuart, F. I. (1997). Designing and implementing new services:
The challenges of integrating service systems, Journal of Retailing, 73(1),
105–134
Taylor, S., & Todd, P. (1995). Decomposition and crossover effects in the theory
of planned behavior: A study of consumer adoption. International Journal of
Research in Marketing, 12(2), 137–155
Teerling, M., Haaker, T., & De Vos, H. (2007). Understanding consumer value of
mobile service bundles. Paper presented at the networking and electronic
commerce research (NAEC 2007), Lake Garda, Italy
Teng, J., & Kettinger, W. (1995). Business process redesign and information
architecture: Exploring the relationships. Database Advances, 26(1), 30–42
Tian, M., Voigt, T., Naumowicz, T., Ritter, H., & Schiller, J. (2004). Performance
considerations for mobile web services. Computer Communications, 27(11),
1097–1105
Tidd, J., Bessant, J., & Pavitt, K. (2001). Managing innovation. New York: Wiley
320 References
Tilson, D., & Lyytinen, K. (2006). The 3G transition: Changes in the US wireless
industry. Telecommunications Policy, 30(10–11), 569–586
Timmers, P. (1998). Business models for E-commerce. Electronic Markets, 8(2),
3–7
TNO. (2006). Marktrapportage Elektronische Communicatie December 2006.
Delft, The Netherlands: TNO
Turban, E., Lee, J., King, D., & Chung, H. M. (2000). Electronic commerce: A
managerial perspective. Upper Saddle River, NJ: Prentice-Hall
Turpeinen, P. (1998). Tarpeet Ja Motiivit. Uusmedia Kuluttajan Silmin (Needs
and motives. new media through the eyes of a consumer). Helsinki, Finland:
Tekes
UMTS Forum. (2002). Report 21 charging, billing and payment views on 3G
business models. London: UMTS Forum
UMTS Forum. (2006). 3G/UMTS evolution: Towards a new generation of
broadband mobile services. London: UMTS Forum
Van Bossuyt, M., & Van Hove, L. (2007). Mobile payment models and their
implications for NextGen Msps. Info, 9(5), 31–43
Van De Kar, E. A. M. (2004). Designing mobile information services: An
approach for organisations in a value network. Delft, The Netherlands: Delft
University of Technology
Van De Kar, E. A. M., & Verbraeck, A. (2007). Designing mobile service systems.
Delft, The Netherlands: IOS Press
Van Der Duin, P. A (2000). Destination 2005. Scenario & Strategy Planning,
2(1), 22–25
Van Der Heijden, K. (1996). Scenarios. The art of strategic conversation.
Chichester: Wiley
Van Der Roest, H. G., Meiland, F. J. M., Comijs, H. C., Vernooij-Dassen, M. J. F. J.,
Van Hout, H., Jonker, C., et al. (2007). What do you need? That’s the
question. The subjective and objective needs of people with dementia living in
the community. Paper presented at the Alzheimer Europe congress, Estoril,
Portugal
Van Der Roest, H. G., Meiland, F. J. M., Maroccini, R., Comijs, H. C., Jonker, C.,
& Dröes, R. M. (2007). Subjective needs in people with dementia. A review
of the literature. International Psychogeriatrics, 19(3), 559–592
Van Oirsouw, R., Spaanderman, J., & De Vries, H. (1993). Informatie-economie:
investeringsstrategie voor de informatievoorziening (Information economy:
Investment strategy for data processing). Schoonhoven, The Netherlands:
Academic Service
Van Weering, M., Jones, V., & Thiele, F. (2007). Chronic pain application: Trial,
platform and results description. Enschede: Freeband
Vargo, S. L., & Lusch, R. F. (2004a). The Four service marketing myths. Journal
of Service Research, 6(4), 324–335
Vargo, S. L., & Lusch, R. F. (2004b). Evolving to a new dominant logic for
marketing. Journal of Marketing, 68(1), 1–17
References 321
Yin, R. K., & Heald, K. A. (1975). Using the case survey method to analyze
policy studies. Administrative Science Quarterly, 20(3), 371–381
Zmijewska, A. (2007). Factors influencing adoption and diffusion of mobile
payments systems. A holistic framework. Sydney: University of Technology
Authors