Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 11 of 11

Full-Text Articles in Business

Enhancing Decision Analysis Models With Web Agents, Jeffrey M. Keisler, Wei Zhang Oct 2006

Enhancing Decision Analysis Models With Web Agents, Jeffrey M. Keisler, Wei Zhang

Jeffrey Keisler

No abstract provided.


Economics Of Information Security Investment In The Case Of Simultaneous Attacks, C. Derrick Huang, Qing Hu, Ravi S. Behara May 2006

Economics Of Information Security Investment In The Case Of Simultaneous Attacks, C. Derrick Huang, Qing Hu, Ravi S. Behara

Qing Hu

With billions of dollars being spent on information security related products and services each year, the economics of information security investment has become an important area of research, with significant implications for management practices. Drawing on recent studies that examine optimal security investment levels under various attack scenarios, we propose an economic model that considers simultaneous attacks from multiple external agents with distinct characteristics, and derive optimal investments based on the principle of benefit maximization. The relationships among the major variables, such as systems vulnerability, security breach probability, potential loss of security breach, and security investment levels, are investigated via …


Business Engineering – Innovation Und Individualisierung Statt Commoditisierung, Hubert Oesterle Mar 2006

Business Engineering – Innovation Und Individualisierung Statt Commoditisierung, Hubert Oesterle

Hubert Oesterle

No abstract provided.


Enabling Agile Adoption Practices Through Network Organizations, Dirk S. Hovorka, Kai R. Larsen Mar 2006

Enabling Agile Adoption Practices Through Network Organizations, Dirk S. Hovorka, Kai R. Larsen

Dirk Hovorka

As distributed organizations increasingly rely on technological innovations to enhance organizational efficiency and competitiveness, interest in agile practices that enable adoption of information technology (IT) based innovations has grown. This study examines the influence of a network organization environment on the ability to develop agile adoption practices. An exploratory case study design was used to investigate the interactions between network structure, social information processing, organizational similarity (homophily), and absorptive capacity during the adoption of a large-scale IT system in two network organization environments within New York State. The data suggest that network organization characteristics and communication processes that reinforced social …


End-User Training: What We Know, What We Need To Know?, Saurabh Gupta, Robert Bostrom Dec 2005

End-User Training: What We Know, What We Need To Know?, Saurabh Gupta, Robert Bostrom

Saurabh Gupta

End-User Training (EUT) has enjoyed a rich tradition of research in Information Systems. However, with the growing pace of change in technology and the dynamic nature of business, organizations are spending an increasing amount of money on end-user training. Training methods are also changing with little research to support new approaches. Thus, extensive research is required in the future. To be credible, end-user training research should preserve and build upon the significant literature that exists, both in IS and Education. This paper provides a review of EUT literature focusing on training methods. It summarizes the findings, while pointing out key …


Using Peer-To-Peer Technology For Collaborative Knowledge Management: Applications And Research Issues, Saurabh Gupta, Robert Bostrom Dec 2005

Using Peer-To-Peer Technology For Collaborative Knowledge Management: Applications And Research Issues, Saurabh Gupta, Robert Bostrom

Saurabh Gupta

As organizations struggle with how to develop and use their inherent expertise, the importance of knowledge management and collaboration has grown in both academic and practitioner communities. This paper outlines a new concept of collaborative knowledge management (CKM), which bridges the two fields. Drawing from literature, we present a conceptual framework for understanding the concepts underlying CKM. Next, this paper explores how a new technology, peer-to-peer (P2P), fits in the CKM paradigm. A discussion on P2P tools and a comparison of these tools with client server tools for enabling the CKM process is presented. P2P has great appeal for CKM …


Ast As A Meta-Theory: Discussion, Extensions And Guidelines, Robert Bostrom, Saurabh Gupta, Dominic Thomas Dec 2005

Ast As A Meta-Theory: Discussion, Extensions And Guidelines, Robert Bostrom, Saurabh Gupta, Dominic Thomas

Saurabh Gupta

No abstract provided.


Economics Of Information Security Investment In The Case Of Simultaneous Attacks, C. Derrick Huang, Qing Hu, Ravi S. Behara Dec 2005

Economics Of Information Security Investment In The Case Of Simultaneous Attacks, C. Derrick Huang, Qing Hu, Ravi S. Behara

Qing Hu

With billions of dollars being spent on information security related products and services each year, the economics of information security investment has become an important area of research, with significant implications for management practices. Drawing on recent studies that examine optimal security investment levels under various attack scenarios, we propose an economic model that considers simultaneous attacks from multiple external agents with distinct characteristics, and derive optimal investments based on the principle of benefit maximization. The relationships among the major variables, such as systems vulnerability, security breach probability, potential loss of security breach, and security investment levels, are investigated via …


Current Status Of Technology Adoption: Micro, Small And Medium Manufacturing Firms In Boston, Pratyush Bharati, Abhijit Chaudhury Dec 2005

Current Status Of Technology Adoption: Micro, Small And Medium Manufacturing Firms In Boston, Pratyush Bharati, Abhijit Chaudhury

Pratyush Bharati

No abstract provided.


Understanding The Future Of Global Software Production: Investigating The Network In India, Pratyush Bharati Dec 2005

Understanding The Future Of Global Software Production: Investigating The Network In India, Pratyush Bharati

Pratyush Bharati

No abstract provided.


Product Customization On The Web: An Empirical Study Of Factors Impacting Choiceboard User Satisfaction, Pratyush Bharati, Abhijit Chaudhury Dec 2005

Product Customization On The Web: An Empirical Study Of Factors Impacting Choiceboard User Satisfaction, Pratyush Bharati, Abhijit Chaudhury

Pratyush Bharati

No abstract provided.