Open Access. Powered by Scholars. Published by Universities.®

Management Information Systems Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 32

Full-Text Articles in Management Information Systems

Non-Monotonic Generation Of Knowledge Paths For Context Understanding, Pei-Chi Lo, Ee-Peng Lim Mar 2024

Non-Monotonic Generation Of Knowledge Paths For Context Understanding, Pei-Chi Lo, Ee-Peng Lim

Research Collection School Of Computing and Information Systems

Knowledge graphs can be used to enhance text search and access by augmenting textual content with relevant background knowledge. While many large knowledge graphs are available, using them to make semantic connections between entities mentioned in the textual content remains to be a difficult task. In this work, we therefore introduce contextual path generation (CPG) which refers to the task of generating knowledge paths, contextual path, to explain the semantic connections between entities mentioned in textual documents with given knowledge graph. To perform CPG task well, one has to address its three challenges, namely path relevance, incomplete knowledge graph, and …


Quantum Machine Learning For Credit Scoring, N. Schetakis, D. Aghamalyan, M. Boguslavsky, A. Rees, Marc Rakotomalala, Paul Griffin Jul 2022

Quantum Machine Learning For Credit Scoring, N. Schetakis, D. Aghamalyan, M. Boguslavsky, A. Rees, Marc Rakotomalala, Paul Griffin

Research Collection School Of Computing and Information Systems

In this paper we explore the use of quantum machine learning (QML) applied to credit scoring for small and medium size businesses (SMEs). A quantum/classical hybrid approach has been used for two years of experimentation with several models, activation functions, epochs, other parameters. Results are shown from the best model, using two quantum classifiers and a classical neural network, applied to data for companies in Singapore. We observe significantly more efficient training for the quantum models over the classical models for comparable prediction performance. Practical issues are also explored including a quadratic computational slow down with the number of qubits …


Using Role Play To Develop An Empathetic Mindset In Executive Education, Siu Loon Hoe, Tamsin Greulich-Smith Oct 2021

Using Role Play To Develop An Empathetic Mindset In Executive Education, Siu Loon Hoe, Tamsin Greulich-Smith

Research Collection School Of Computing and Information Systems

The purpose of this article is to discuss the importance of a role play activity as part of an experiential instructional strategy to develop an empathetic mindset among professionals, managers, and executives (PMEs) attending an executive education program in change management. This article provides an approach and process for management educators and facilitators of executive education programs to introduce and teach role play for the busy executives to learn about empathy. Role play is a useful teaching method that helps adult learners understand the importance of seeing things from another person’s point of view especially within a short period of …


How Do Monetary Incentives Influence Giving? An Empirical Investigation Of Matching Subsidies On Kiva, Zhiyuan Gao, Zhiling Guo, Qian Tang Mar 2021

How Do Monetary Incentives Influence Giving? An Empirical Investigation Of Matching Subsidies On Kiva, Zhiyuan Gao, Zhiling Guo, Qian Tang

Research Collection School Of Computing and Information Systems

Matching subsidies, through which third-party institutions provide a dollar-for-dollar match of private contributions made through selected campaigns, have served as effective tools to boost fundraising. We utilize a quasi-experiment on a prosocial crowdfunding platform to examine the effectiveness of matching subsidies in shaping funding outcomes and lender behaviors. Although matching subsidies offer matched loans competitive advantages over unmatched loans, we find that total private contributions made to both matched and unmatched loans increase compared to their prematching counterparts, suggesting a positive spillover effect on unmatched loans. However, matching subsidies lead to decreased private contributions made on the platform after a …


Can We Classify Cashless Payment Solution Implementations At The Country Level?, Dennis Ng, Robert J. Kauffman, Paul Robert Griffin Mar 2021

Can We Classify Cashless Payment Solution Implementations At The Country Level?, Dennis Ng, Robert J. Kauffman, Paul Robert Griffin

Research Collection School Of Computing and Information Systems

This research commentary proposes a 3-D implementation classification framework to assist service providers and business leaders in understanding the kinds of contexts in which more or less successful cashless payment solutions are observed at point-of-sale (PoS) settings. Three constructs characterize the framework: the digitalization of the local implementation environment; the relative novelty of a given payment technology solution in a country at a specific point in time; and the development status of the country’s national infrastructure. The framework is motivated by a need to support cross-country research in this domain. We analyze eight country mini-cases based on an eight-facet (2 …


Migrating From Monoliths To Cloud-Based Microservices: A Banking Industry Example, Alan Megargel, Venky Shankararaman, David K. Walker Jan 2020

Migrating From Monoliths To Cloud-Based Microservices: A Banking Industry Example, Alan Megargel, Venky Shankararaman, David K. Walker

Research Collection School Of Computing and Information Systems

As more organizations are placing cloud computing at the heart of their digital transformation strategy, it is important that they adopt appropriate architectures and development methodologies to leverage the full benefits of the cloud. A mere “lift and move” approach, where traditional monolith applications are moved to the cloud will not support the demands of digital services. While, monolithic applications may be easier to develop and control, they are inflexible to change and lack the scalability needed for cloud environments. Microservices architecture, which adopts some of the concepts and principles from service-oriented architecture, provides a number of benefits when developing …


The Topicality Of The Learning Organization: Is The Concept Still Relevant Today?, Siu Loon Hoe Jan 2020

The Topicality Of The Learning Organization: Is The Concept Still Relevant Today?, Siu Loon Hoe

Research Collection School Of Computing and Information Systems

This chapter introduces the current level of interest in the learning organization and usefulness of the concept at the present time. It reviews authors who have recently and explicitly commented on the topicality of the learning organization, offers a qualitative content analysis of recent journal publications on learning organizations justifying the need for the concept, and uses quantitative research using print media indicators and Google Trends to identify the number of publications related to the learning organization over time. The results suggest that while the level of interest in the learning organization among scientific researchers has grown, the level of …


Cross-Border Interbank Payments And Settlements: Emerging Opportunities For Digital Transformation, Yi Meng Lau, Et Al Nov 2018

Cross-Border Interbank Payments And Settlements: Emerging Opportunities For Digital Transformation, Yi Meng Lau, Et Al

Research Collection School Of Computing and Information Systems

The report “Cross-Border Interbank Payments and Settlements” is a cross-jurisdictional industry collaboration between Canada, Singapore and the United Kingdom to examine the existing challenges and frictions that arise when undertaking crossborder payments. This report explores proposals for new and more efficient models for processing cross-border transactions.


A Strategic Value Appropriation Path For Cloud Computing, Abhishek Kathuria, Arti Mann, Jiban Khuntia, Robert J. Kauffman Sep 2018

A Strategic Value Appropriation Path For Cloud Computing, Abhishek Kathuria, Arti Mann, Jiban Khuntia, Robert J. Kauffman

Research Collection School Of Computing and Information Systems

Cloud-based information management is one of the leading competitive differentiation strategies for firms. With the increasing criticality of information management in value creation and process support, establishing an integrated capability with cloud computing is vital for organizational success in the changing landscape of business competition. These issues have received scant attention, however. We draw on the resource-based view, dynamic capability hierarchy concepts, and the perspective of operand and operant resources to suggest a cloud value appropriation model for firms. We argue that, to appropriate business value from cloud computing, the firm needs to effectively deploy cloud computing and leverage cloud …


A Model Of Competition Between Perpetual Software And Software As A Service, Zhiling Guo, Dan Ma Mar 2018

A Model Of Competition Between Perpetual Software And Software As A Service, Zhiling Guo, Dan Ma

Research Collection School Of Computing and Information Systems

Duplicate record, see https://ink.library.smu.edu.sg/sis_research/3744/. Software as a service (SaaS) has grown to be a significant segment of many software product markets. SaaS vendors, which charge customers based on use and continuously improve the quality of their products, have put competitive pressure on traditional perpetual software vendors, which charge a licensing fee and periodically upgrade the quality of their software. We develop an analytical model to study the competitive pricing strategies of an incumbent perpetual software vendor in the presence of a SaaS competitor. We find that, depending on both the SaaS quality improvement rate and the network effect, the …


A Model Of Competition Between Perpetual Software And Software As A Service, Zhiling Guo, Dan Ma Mar 2018

A Model Of Competition Between Perpetual Software And Software As A Service, Zhiling Guo, Dan Ma

Research Collection School Of Computing and Information Systems

Software as a service (SaaS) has grown to be a significant segment of many software product markets. SaaS vendors, which charge customers based on use and continuously improve the quality of their products, have put competitive pressure on traditional perpetual software vendors, which charge a licensing fee and periodically upgrade the quality of their software. We develop an analytical model to study the competitive pricing strategies of an incumbent perpetual software vendor in the presence of a SaaS competitor. We find that, depending on both the SaaS quality improvement rate and the network effect, the perpetual software vendor adopts one …


Mining Capstone Project Wikis For Knowledge Discovery, Swapna Gottipati, Venky Shankararaman, Melvrivk Goh Jul 2017

Mining Capstone Project Wikis For Knowledge Discovery, Swapna Gottipati, Venky Shankararaman, Melvrivk Goh

Research Collection School Of Computing and Information Systems

Wikis are widely used collaborative environments as sources of information and knowledge. The facilitate students to engage in collaboration and share information among members and enable collaborative learning. In particular, Wikis play an important role in capstone projects. Wikis aid in various project related tasks and aid to organize information and share. Mining project Wikis is critical to understand the students learning and latest trends in industry. Mining Wikis is useful to educationists and academicians for decision-making about how to modify the educational environment to improve student's learning. The main challenge is that the content or data in project Wikis …


Multi-Authority Abs Supporting Dendritic Access Structure, Ruo Mo, Jian-Feng Ma, Ximeng Liu, Qi Li Jul 2017

Multi-Authority Abs Supporting Dendritic Access Structure, Ruo Mo, Jian-Feng Ma, Ximeng Liu, Qi Li

Research Collection School Of Computing and Information Systems

Attribute-based signature (ABS), which could realize fine-grained access control, was considered to be an importantmethod for anonymous authentication in cloud computing. However, normal ABS only provided simple accesscontrol through threshold structure and thus could not cope with the large-scale attribute sets of users in the cloud. Moreover,the attribute sets were supervised by only one attribute authority, which increased the cost of computation and storage.The whole system was in danger of collapsing once the attribute authority was breached. Aiming at tackling theproblems above, a novel scheme, was proposed called multi-authority ABS supporting dendritic access structure whichsupported any AND, OR and threshold …


Charitable Fundraising: Gaining Donors' Trust On Online Platforms, Deserinas Sulaeman Jun 2017

Charitable Fundraising: Gaining Donors' Trust On Online Platforms, Deserinas Sulaeman

Research Collection School Of Computing and Information Systems

Trust is crucial in the relationships between charitable fundraisers and potential donors. This study examines factors that can help fundraisers gain potential donors’ trust, which is crucial to the success of the campaigns. Examining charitable fundraising campaigns on an online platform, this study finds that trust issues can be mitigated by providing a campaign description that is more sophisticated, more informative, and with fewer errors. Additionally, setting a higher campaign funding goal tends to lead to a more successful campaign. These characteristics likely reflect a competent, committed, and passionate fundraiser. On the other hand, mere exposure to a wide set …


The Dark Side Of Banning Hacking Technique Discussion, Qiu-Hong Wang, Ting Zhang Le Jun 2017

The Dark Side Of Banning Hacking Technique Discussion, Qiu-Hong Wang, Ting Zhang Le

Research Collection School Of Computing and Information Systems

Prior studies have evidenced the effectiveness of more severe and broader enforcement in deterringcybercrimes. This study addresses the other side of the story. Our data analysis shows that theenforcement against the production / distribution / possession of computer misuse tools tends toincrease the contribution on detection and protection related posts in online hacker forums. Butthis enforcement may discourage those contributors who had originally actively contributed to theprotection discussions. Thus government regulations have to be cautiously justify the incentives ofmultiple parties in the cybersecurity context.


Joint Optimization Of Resource Provisioning In Cloud Computing, Jonathan David Chase, Dusit Niyato May 2017

Joint Optimization Of Resource Provisioning In Cloud Computing, Jonathan David Chase, Dusit Niyato

Research Collection School Of Computing and Information Systems

Cloud computing exploits virtualization to provision resources efficiently. Increasingly, Virtual Machines (VMs) have high bandwidth requirements; however, previous research does not fully address the challenge of both VM and bandwidth provisioning. To efficiently provision resources, a joint approach that combines VMs and bandwidth allocation is required. Furthermore, in practice, demand is uncertain. Service providers allow the reservation of resources. However, due to the dangers of over-and under-provisioning, we employ stochastic programming to account for this risk. To improve the efficiency of the stochastic optimization, we reduce the problem space with a scenario tree reduction algorithm, that significantly increases tractability, whilst …


Understanding The Information-Based Transformation Of Strategy And Society, Eric K. Clemons, Rajiv M. Dewan, Robert J. Kauffman, Thomas A. Weber Apr 2017

Understanding The Information-Based Transformation Of Strategy And Society, Eric K. Clemons, Rajiv M. Dewan, Robert J. Kauffman, Thomas A. Weber

Research Collection School Of Computing and Information Systems

The world economy is undergoing dramatic changes, largely driven by the new availability of fine-grained information. Innovative ways of using data—large and small—have also prompted a rethinking of the boundaries for the combination and use of knowledge. The strategic design of information flows in the economy has the upside of higher economic rents and competitive advantage, as well as the downsides of wealth inequality and abuse of power. This has brought a wide range of regulatory challenges. To understand the nature of these sweeping changes, it is important to examine the new ways information is used, and how information flows …


Special Section: Economics, Electronic Commerce, And Competitive Strategy, Eric K. Clemons, Rajiv M. Dewan, Robert John Kauffman Jan 2015

Special Section: Economics, Electronic Commerce, And Competitive Strategy, Eric K. Clemons, Rajiv M. Dewan, Robert John Kauffman

Research Collection School Of Computing and Information Systems

The title of this year;s special section of selected papers, whose initial versionswere presented at the “Economics and Electronic Commerce,” and “Information Technologyand Competitive Strategy” mini-tracks of the 2001 Hawaii International Conferenceon Systems Science (HICSS), reflects the increasing convergence of ideas fromEconomics and Information Systems (IS) research. This convergence has been occurringover the last several years and is related to the developments in e-commerce. ISresearch has been rapidly coming of age, driven by the ever-increasing importance ofinformation technology (IT) in the marketplace, and the need for managers, investors,policy-makers, and the public to understand how to more effectively navigate in ourhighly …


An Ecological Model For Digital Platforms Maintenance And Evolution, Paolo Rocchi, Paolo Spagnoletti, Subhajit Datta Nov 2014

An Ecological Model For Digital Platforms Maintenance And Evolution, Paolo Rocchi, Paolo Spagnoletti, Subhajit Datta

Research Collection School Of Computing and Information Systems

The maintenance of software products has been studied extensively in both software engineering and management information systems. Such studies are mainly focused on the activities that take place prior to starting the maintenance phase. Their contribution is either related to the improvement of software quality or to validating contingency models for reducing maintenance efforts. The continuous maintenance philosophy suggests to shift the attention within the maintenance phase for better coping with the evolutionary trajectories of digital platforms. In this paper, we examine the maintenance process of a digital platform from the perspective of the software vendor. Based on our empirical …


A Retail Bank's Bpm Experience, Shankararaman, Venky, Gottipati Swapna, Randall E. Duran Jul 2014

A Retail Bank's Bpm Experience, Shankararaman, Venky, Gottipati Swapna, Randall E. Duran

Research Collection School Of Computing and Information Systems

This real-life case study, which was undertaken by a leading financial services group in the Asia-Pacific region, is used to demonstrate the innovative use of BPM (Business Process Management) technology in a competitive business area. It describes how a BPM project, within the Application Verification and Capture (AVC), was conceived, designed and implemented in order to deliver strategic value to the organization. Hereafter, the financial services group will be referred to as “the bank”. The AVC project was targeted at one of the bank's processes called the Application Verification and Capture (AVC) process for unit trust products. This process involved …


Mini-Track Introduction: Information Economics, Competition, Regulation, Law And Society, Eric K. Clemons, Robert John Kauffman, Thomas A. Weber Jan 2014

Mini-Track Introduction: Information Economics, Competition, Regulation, Law And Society, Eric K. Clemons, Robert John Kauffman, Thomas A. Weber

Research Collection School Of Computing and Information Systems

This mini-track is informed by the most modern thinking in information economics and competitive strategy, and includes many interdisciplinary applications of IS and technology.


Are There Contagion Effects In Information Technology And Business Process Outsourcing?, Arti Mann, Robert J. Kauffman, Kunsoo Han, Barrie R. Nault Nov 2011

Are There Contagion Effects In Information Technology And Business Process Outsourcing?, Arti Mann, Robert J. Kauffman, Kunsoo Han, Barrie R. Nault

Research Collection School Of Computing and Information Systems

We model the diffusion of IT outsourcing using announcements about IT outsourcing deals. We estimate a lognormal diffusion curve to test whether IT outsourcing follows a pure diffusion process or there are contagion effects involved. The methodology permits us to study the consequences of outsourcing events, especially mega-deals with IT contract amounts that exceed US$1 billion. Mega-deals act, we theorize, as precipitating events that create a strong basis for contagion effects and are likely to affect decision-making by other firms in an industry. Then, we evaluate the role of different communication channels in the diffusion process of IT outsourcing by …


Confidence Weighted Mean Reversion Strategy For On-Line Portfolio Selection, Bin Li, Steven C. H. Hoi, Peilin Zhao, Vivek Gopalkrishnan Apr 2011

Confidence Weighted Mean Reversion Strategy For On-Line Portfolio Selection, Bin Li, Steven C. H. Hoi, Peilin Zhao, Vivek Gopalkrishnan

Research Collection School Of Computing and Information Systems

On-line portfolio selection has been attracting increasing attention from the data mining and machine learning communities. All existing on-line portfolio selection strategies focus on the first order information of a portfolio vector, though the second order information may also be beneficial to a strategy. Moreover, empirical evidences show that the stock price relatives may follow the mean reversion property, which has not been fully exploited by existing strategies. This article proposes a novel on-line portfolio selection strategy named ``Confidence Weighted Mean Reversion'' (CWMR). Inspired by the mean reversion principle in finance and confidence weighted online learning technique in machine learning, …


Differentiating Knowledge Processes In Organisational Learning: A Case Of “Two Solitudes”, Siu Loon Hoe, Steven Mcshane Mar 2010

Differentiating Knowledge Processes In Organisational Learning: A Case Of “Two Solitudes”, Siu Loon Hoe, Steven Mcshane

Research Collection School Of Computing and Information Systems

The fields of organizational behavior (OB)/strategy and marketing have taken different paths over the past two decades to understanding organizational learning. OB/strategy has been pre-occupied with theory development and case study illustrations, whereas marketing has taken a highly quantitative path. Although relying on essentially the same foundation theory, the two disciplines have had minimal crossfertilization. Furthermore, both fields tend to blur or usually ignore the distinction between structural and informal knowledge processes. The purpose of the paper is to highlight the distinction between informal and structural knowledge acquisition and dissemination processes and propose new definitions to differentiate them. Future research …


Applying Soft Cluster Analysis Techniques To Customer Interaction Information, Randall E. Duran, Li Zhang, Tom Hayhurst Jan 2010

Applying Soft Cluster Analysis Techniques To Customer Interaction Information, Randall E. Duran, Li Zhang, Tom Hayhurst

Research Collection School Of Computing and Information Systems

The number of channels available for companies and customers to communicate with one another has increased dramatically over the past several decades. Although some market segmentation efforts utilize high-level customer interaction statistics, in-depth information regarding customers’ use of different communication channels is often ignored. Detailed customer interaction information can help companies improve the way that they market to customers by taking into consideration customers’ behaviour patterns and preferences. However, a key challenge of interpreting customer contact information is that many channels have only been in existence for a relatively short period of time, and thus, there is limited understanding and …


Relative Importance, Specific Investment And Ownership In Interorganizational Systems., Kunsoo Han, Robert J. Kauffman, Barrie R. Nault Sep 2008

Relative Importance, Specific Investment And Ownership In Interorganizational Systems., Kunsoo Han, Robert J. Kauffman, Barrie R. Nault

Research Collection School Of Computing and Information Systems

Implementation and maintenance of interorganizational systems (IOS) require investments by all the participating firms. Compared with intraorganizational systems, however, there are additional uncertainties and risks. This is because the benefits of IOS investment depend not only on a firm's own decisions, but also on those of its business partners. Without appropriate levels of investment by all the firms participating in an IOS, they cannot reap the full benefits. Drawing upon the literature in institutional economics, we examine IOS ownership as a means to induce value-maximizing noncontractible investments. We model the impact of two factors derived from the theory of incomplete …


Probabilistic Sales Forecasting For Small And Medium-Size Business Operations, Randall E. Duran Jan 2008

Probabilistic Sales Forecasting For Small And Medium-Size Business Operations, Randall E. Duran

Research Collection School Of Computing and Information Systems

One of the most important aspects of operating a business is the forecasting of sales and allocation of resources to fulfill sales. Sales assessments are usually based on mental models that are not well defined, may be biased, and are difficult to refine and improve over time. Defining sales forecasting models for small- and medium-size business operations is especially difficult when the number of sales events is small but the revenue per sales event is large. This chapter reviews the challenges of sales forecasting in this environment and describes how incomplete and potentially suspect information can be used to produce …


Is Interpersonal Trust A Necessary Condition For Organisational Learning?, Siu Loon Hoe Jul 2007

Is Interpersonal Trust A Necessary Condition For Organisational Learning?, Siu Loon Hoe

Research Collection School Of Computing and Information Systems

The organisational behaviour and management literature has devoted a lot attention on various factors affecting organisational learning. While there has been much work done to examine trust in promoting organisational learning, there is a lack of consensus on the specific type of trust involved. The purpose of this paper is to highlight the importance of interpersonal trust in promoting organisational learning and propose a research agenda to test the extent of interpersonal trust on organisational learning. This paper contributes to the existing organisational learning literature by specifying a specific form of trust, interpersonal trust, which promotes organisational learning and proposing …


Valuing Information Technology Infrastructures: A Growth Options Approach, Qizhi Dai, Robert J. Kauffman, Salvatore T. March Mar 2007

Valuing Information Technology Infrastructures: A Growth Options Approach, Qizhi Dai, Robert J. Kauffman, Salvatore T. March

Research Collection School Of Computing and Information Systems

Decisions to invest in information technology (IT) infrastructure are often made based on an assessment of its immediate value to the organization. However, an important source of value comes from the fact that such technologies have the potential to be leveraged in the development of future applications. From a real options perspective, IT infrastructure investments create growth options that can be exercised if and when an organization decides to develop systems to provide new or enhanced IT capabilities. We present an analytical model based on real options that shows the process by which this potential is converted into business value, …


Tacit Knowledge, Nonaka And Takeuchi Seci Model And Informal Knowledge Processes, Siu Loon Hoe Mar 2006

Tacit Knowledge, Nonaka And Takeuchi Seci Model And Informal Knowledge Processes, Siu Loon Hoe

Research Collection School Of Computing and Information Systems

The organizational behavior and knowledge management literature has devoted a lot attention on how structural knowledge processes enhance learning. There has been little emphasis on the informal knowledge processes and the construct remains undefined. The purpose of this paper is to highlight the importance of informal knowledge processes, propose a definition for these processes and link them to the socialization and internalization processes suggested by Nonaka and Takeuchi in the SECI model. The paper offers a fresh perspective on how informal knowledge processes in organizations help to enhance the organization’s learning capability. It will enable scholars and managers to have …