Service of SURF
© 2025 SURF
Small medium enterprises represent the largest share of revenues in the apparel and fashion business, compared to larger integrated companies. Small companies however often have to rely on larger suppliers in order to efficiently produce their products. These larger suppliers however will often prioritize companies that place larger orders. In the impossibility to deliver larger orders, how can these buyers make sure that a producer complies with their requests? In this paper we try to answer this question by applying concepts from the marketing channels literature to the specific context of fashion buying. We conclude that despite that the peculiarities of the fashion business do not foster the formation of long-term commitment, dependent companies can develop sources of power based on knowledge and reputation, but also based on applying non-mediated ways to manage the buyer-seller relationship. Examples of possible power sources for a buyer are: establishing a strong brand that a business partner will use in promoting its proposition, forcing suppliers to make transaction specific investments (which are not redeploy able), specializing in new products and technologies that a supplier will want to understand and use, developing knowledge that can be exchanged in the form of specialized personnel, investing in standardization of communication before the relationship starts in order to reduce administrative costs for both parties. Power sources are most effective when non-mediated, i.e. informal and based on reciprocity; ‘hard’ contracts with punishments (coercive power sources) in case of non-compliance will diminish the willingness to collaborate.
Regenerative agriculture is increasingly seen as the way forward to safeguard soil fertility and with that economic, human and natural sustainability. The fashion industry, being very much reliant on inputs from the agricultural sector, can play a pivotal role in promoting regenerative practices. In order to do so however it needs to radically rethink its business model, or else it will not be able to reap all the possible benefits.
We describe here the design and implementation of the Fashion Tech Farm (FTF), which aims to drive sustainable innovation in garments and fashion. We describe our goals, design principles, and the implementation. The design principles are rooted in an understanding of the fashion system, open networks, and entrepreneurial thinking. After four years of work on the FTF, we review three projects to evaluate how far the work has achieved the main goals and how our design principles are developing.
MULTIFILE
Het doel van dit interdisciplinaire SIA KIEM project Fluïde Eigenschap in de Creatieve Industrie is te onderzoeken of en hoe gedeelde vormen van eigenaarschap in de creatieve industrie kunnen bijdragen aan het creëren van een democratischer en duurzamer economie, waarin ook het MKB kan participeren in digitale innovatie. Het project geeft een overzicht van beschikbare vormen van (gedeeld) eigenaarschap, hun werking en hoe deze creatieve professionals kunnen ondersteunen bij de transitie naar de platformeconomie. Dit wordt toegepast op een concrete case, dat van een digitale breimachine. Naast het leveren van een goede praktijk, moet het project leiden tot een groter internationaal onderzoeksvoorstel over Fluid Ownership in the Creative Industry, dat dieper ingaat op de beschikbare eigendomsoplossingen en hoe deze waarde zullen creëren voor de creatieve professional.
Over the past decade, the trend in both the public sector and industry has been to outsource ICT to the cloud. While cost savings are often used as a rationale for outsourcing, another argument that is frequently used is that the cloud improves security. The reasoning behind this is twofold. First, cloud service providers are typically thought to have skilled staff trained in good security practices. Second, cloud providers often have a vastly distributed, highly connected network infrastructure, making them more resilient in the face of outages and denial-of-service attacks. Yet many examples of cloud outages, often due to attacks, call into question whether outsourcing to the cloud does improve security. In this project our goal therefore is to answer two questions: 1) did the cloud make use more secure?and 2) can we provide specific security guidance to support cloud outsourcing strategies? We will approach these questions in a multi-disciplinary fashion from a technical angle and from a business and management perspective. On the technical side, the project will focus on providing comprehensive insight into the attack surface at the network level of cloud providers and their users. We will use a measurement-based approach, leveraging large scale datasets about the Internet, both our own data (e.g. OpenINTEL, a large- scale dataset of active DNS measurements) and datasets from our long-term collaborators, such as CAIDA in the US (BGPStream, Network Telescope) and Saarland University in Germany (AmpPot). We will use this data to study the network infrastructure outside and within cloud environments to structurally map vulnerabilities to attacks as well as to identify security anti-patterns, where the way cloud services are managed or used introduce a weak point that attackers can target. From a business point of view, we will investigate outsourcing strategies for both the cloud providers and their customers. For guaranteeing 100% availability, cloud service providers have to maintain additional capacity at all times. They also need to forecast capacity requirements continuously for financially profitable decisions. If the forecast is lower than the capacity needed, then the cloud is not able to deliver 100% availability in case of an attack. Conversely, if the forecast is substantially higher, the cloud service provider might not be able to make desired profits. We therefore propose to assess the risk profiles of cloud providers (how likely it is a cloud provider is under attack at a given time given the nature of its customers) using available attack data to improve the provider resilience to future attacks. From the costumer perspective, we will investigate how we can support cloud outsourcing by taking into consideration business and technical constraints. Decision to choose a cloud service provider is typically based on multiple criteria depending upon the company’s needs (security and operational). We will develop decision support systems that will help in mapping companies’ needs to cloud service providers’ offers.