Open Access. Powered by Scholars. Published by Universities.®
Operations Research, Systems Engineering and Industrial Engineering Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Keyword
-
- Technology (9)
- Information (7)
- IT (6)
- Internet (5)
- Economy (4)
-
- Online (4)
- System (4)
- Business (3)
- Consumer (3)
- Management (3)
- Network (3)
- Security (3)
- Analysis (2)
- Conference Papers (2)
- Industry (2)
- Mobile (2)
- Programming (2)
- Project (2)
- Quality (2)
- Quantitative (2)
- Survey (2)
- Systems (2)
- Traffic (2)
- AI (1)
- Action theory (1)
- Actor (1)
- Addiction (1)
- Administration (1)
- Algebra (1)
- Applications (1)
- Publication
-
- Journal of International Technology and Information Management (20)
- Research Collection School Of Computing and Information Systems (6)
- Engineering Management & Systems Engineering Theses & Dissertations (2)
- Nader Ale Ebrahim (2)
- Business and Information Technology Faculty Research & Creative Works (1)
-
- Department of Industrial and Management Systems Engineering: Faculty Publications (1)
- Eric Bickel (1)
- Industrial and Management Systems Engineering: Instructional Materials (1)
- Mechanical and Aerospace Engineering - All Scholarship (1)
- Systems Science Faculty Publications and Presentations (1)
- Theses (1)
- World Maritime University Dissertations (1)
- Publication Type
- File Type
Articles 1 - 30 of 38
Full-Text Articles in Operations Research, Systems Engineering and Industrial Engineering
The Price Of Stability In Selfish Scheduling Games, Lucas Agussurja, Hoong Chuin Lau
The Price Of Stability In Selfish Scheduling Games, Lucas Agussurja, Hoong Chuin Lau
Research Collection School Of Computing and Information Systems
Game theory has gained popularity as an approach to analysing and understanding distributed systems with selfinterested agents. Central to game theory is the concept of Nash equilibrium as a stable state (solution) of the system, which comes with a price - the loss in efficiency. The quantification of the efficiency loss is one of the main research concerns. In this paper, we study the quality and computational characteristic of the best Nash equilibrium in two selfish scheduling models: the congestion model and the sequencing model. In particular, we present the following results: (1) In the congestion model: first, the best …
Multi-Period Combinatorial Auction Mechanism For Distributed Resource Allocation And Scheduling, Hoong Chuin Lau, Shih-Fen Cheng, Thin Yin Leong, Jong Han Park, Zhengyi Zhao
Multi-Period Combinatorial Auction Mechanism For Distributed Resource Allocation And Scheduling, Hoong Chuin Lau, Shih-Fen Cheng, Thin Yin Leong, Jong Han Park, Zhengyi Zhao
Research Collection School Of Computing and Information Systems
We consider the problem of resource allocation and scheduling where information and decisions are decentralized, and our goal is to propose a market mechanism that allows resources from a central resource pool to be allocated to distributed decision makers (agents) that seek to optimize their respective scheduling goals. We propose a generic combinatorial auction mechanism that allows agents to competitively bid for the resources needed in a multi-period setting, regardless of the respective scheduling problem faced by the agent, and show how agents can design optimal bidding strategies to respond to price adjustment strategies from the auctioneer. We apply our …
Designing The Market Game For A Commodity Trading Simulation, Shih-Fen Cheng
Designing The Market Game For A Commodity Trading Simulation, Shih-Fen Cheng
Research Collection School Of Computing and Information Systems
In this paper, we propose to design a market game that (a) can be used in modeling and studying commodity trading scenarios, and (b) can be used in capturing human traders' behaviors. Specifically, we demonstrate the usefulness of this commodity trading game in a single-commodity futures trading scenario. A pilot experiment was run with a mixture of human traders and an autonomous agent that emulates the aggregatedmarket condition, with the assumption that this autonomous agent would hint each of its action through a public announcement. We show that the information collected from this simulation can be used to extract the …
Semester Project For Engineering Management, Paul Savory
Semester Project For Engineering Management, Paul Savory
Industrial and Management Systems Engineering: Instructional Materials
This is the semester-project for my IMSE 405/805 course on Engineering Management at the University of Nebraska-Lincoln. This team-based project required students to develop an operational plan (facility layout, required staffing, company operating policies, company benefits program) for a specified product.
Radical Impact Of Change In Actions And Confidence Index On Reverse Decision Making An Application Based Study, Swatee Trimbak Paithankar
Radical Impact Of Change In Actions And Confidence Index On Reverse Decision Making An Application Based Study, Swatee Trimbak Paithankar
Engineering Management & Systems Engineering Theses & Dissertations
While making decisions under uncertainty, people are often unaware of the logical approach to form the decision process. It is assumed that collecting details, analyzing and evaluating data is enough to make 'proper' decisions. However, past research in the decision making arena has significantly validated that there exists a class of decision problems which is complex, ill-structured and not defined to the level where decision makers can draw logical conclusions based on existing traditional decision approaches. RDM (reverse decision making), one of the novel approaches of decision making under conditions of uncertainty, has shown potential towards addressing some of these …
Robust Local Search And Its Application To Generating Robust Schedules, Hoong Chuin Lau, Fei Xiao, Thomas Ou
Robust Local Search And Its Application To Generating Robust Schedules, Hoong Chuin Lau, Fei Xiao, Thomas Ou
Research Collection School Of Computing and Information Systems
In this paper, we propose an extended local search framework to solve combinatorial optimization problems with data uncertainty. Our approach represents a major departure from scenario-based or stochastic programming approaches often used to tackle uncertainty. Given a value 0 < ? 1, we are interested to know what the robust objective value is, i.e. the optimal value if we allow an chance of not meeting it, assuming that certain data values are defined on bounded random variables. We show how a standard local search or metaheuristic routine can be extended to efficiently construct a decision rule with such guarantee, albeit heuristically. We demonstrate its practical applicability on the Resource Constrained Project Scheduling Problem with minimal and maximal time lags (RCPSP/max) taking into consideration activity duration uncertainty. Experiments show that, partial order schedules can be constructed that are robust in our sense without the need for a large planned horizon (due date), which improves upon the work proposed by Policella et al. 2004.
Research On Logistics Operation Mode Of Shanghai 2010 Expo, Jiaying Chen
Research On Logistics Operation Mode Of Shanghai 2010 Expo, Jiaying Chen
World Maritime University Dissertations
No abstract provided.
Using Reconstructability Analysis For Input Variable Reduction: A Business Example, Stephen Shervais, Martin Zwick
Using Reconstructability Analysis For Input Variable Reduction: A Business Example, Stephen Shervais, Martin Zwick
Systems Science Faculty Publications and Presentations
We demonstrate the use of reconstructability analysis (RA) on the UCI Australian Credit dataset to reduce the number of input variables for two different analysis tools. Using 14 variables, an artificial neural net (NN) is able to predict whether or not credit was granted, with a 79.1% success rate. RA preprocessing allows us to reduce the number of independent variables from 14 to two different sets of three, which have success rates of 77.2% and 76.9% respectively. The difference between these rates and that of the 14-variable NN is not statistically significant. The three-variable rulesets given by RA achieve success …
Generating Job Schedules For Vessel Operations In A Container Terminal, Thin Yin Leong, Hoong Chuin Lau
Generating Job Schedules For Vessel Operations In A Container Terminal, Thin Yin Leong, Hoong Chuin Lau
Research Collection School Of Computing and Information Systems
No abstract provided.
Globalization Of R&D And Developing Countries, Arash Golnam, Nader Ale Ebrahim, Ali Ghazizadeh
Globalization Of R&D And Developing Countries, Arash Golnam, Nader Ale Ebrahim, Ali Ghazizadeh
Nader Ale Ebrahim
Reflecting a broader trend towards the off shoring of services, a number of developing countries are attracting foreign direct investment in research and development. Transnational corporations, including the ones headquartered in developed countries, are selecting developing countries as locations for such activities. With the off shoring of research and development, firms aim to access the skills of new locations, adapting products to local markets and reducing their costs, in response to competitive pressures, technological changes and a more liberal trade and investment environment. In particular, information and communication technologies have had a profound effect on the way economic activities, including …
Engineering Management And Industrial Engineering: Similarities And Differences, Cassandra C. Elrod, Ashley Rasnic, William Daughton
Engineering Management And Industrial Engineering: Similarities And Differences, Cassandra C. Elrod, Ashley Rasnic, William Daughton
Business and Information Technology Faculty Research & Creative Works
Engineering Management is a broad and diverse field of engineering, thereby making it difficult to define exactly what the degree encompasses. At the same time, the somewhat related degree of Industrial Engineering is better understood. Some universities offer a Bachelor of Science degree in Engineering Management with an emphasis in Industrial Engineering, while others offer a Bachelor of Science degree in Industrial Engineering with an emphasis in Engineering Management. In today's world of competitive academia, many wonder if these degree fields are similar enough to be used interchangeably or if there is a distinct difference separating the two degrees, making …
R&D Management In Iran, Opportunities And Threats, Nader Ale Ebrahim, Ali Ghazizadeh, Arash Golnam, Hamid Tahbaz Tavakoli
R&D Management In Iran, Opportunities And Threats, Nader Ale Ebrahim, Ali Ghazizadeh, Arash Golnam, Hamid Tahbaz Tavakoli
Nader Ale Ebrahim
Research and Development (R&D) management in Iran has faced many barriers and obstacles, in which R&D units are considered as the basic core of the product development and innovation. Due to structural shortcomings, a great number of organizations and industries have not yet been able to position themselves in the market. There are about 1141 R&D units throughout Iran, due to the geographical decentralization of these units this paper considers and analyzes the R&D case study in one of the provinces located in the north part of Iran, and the findings can be generalized to the other industrialized areas and …
2007 Survey Of Summer Sessions Students At The University Of Nebraska-Lincoln, Paul Savory
2007 Survey Of Summer Sessions Students At The University Of Nebraska-Lincoln, Paul Savory
Department of Industrial and Management Systems Engineering: Faculty Publications
During Summer 2007, UNL Summer Sessions (FlexEd) surveyed summer students to learn about their experience in taking a summer course(s). The survey results will offer confirmation of what we are doing well and will provide guidance on areas of improvement and better strategies for marketing UNL summer opportunities. A total of 227 students completed the survey. Fifteen summer classes were selected to complete a paper-based or electronic version of the survey. The classes were from three different summer sessions and used different delivery mechanisms (on-campus, studio, distance education).
An Exploratory Study Of Iso 9001:2000 Quality Management Systems Using The Iso/Iec 15504 Architecture, Paul Richard Shimp
An Exploratory Study Of Iso 9001:2000 Quality Management Systems Using The Iso/Iec 15504 Architecture, Paul Richard Shimp
Engineering Management & Systems Engineering Theses & Dissertations
The purpose of this paper is to provide an exploratory study on the implementation and issues regarding Quality Management Systems as defined by ISO 9001 :2000 using the architecture of ISO/IEC 15504. The recently published ISO/IEC 15504 series of standards provides a framework to assess processes and determine levels of capability. With the use of this framework, the study will focus on the assessment and identification of problem areas requiring focus for continual improvement within an ISO 9001 :2000 quality management system.
The structure of this paper is as follows: Section 1 provides a background discussion of ISO 9001 :2000. …
Determining Continual Improvement Process Methods Within Quality Management Systems, Diane M. Bové
Determining Continual Improvement Process Methods Within Quality Management Systems, Diane M. Bové
Theses
Institutionalized standards require organizations to actively define and implement quality management systems, which includes active participation in continual improvement efforts. Interpretations and practices vary on implementation methodology.
Traditional views of quality do not integrate the technical disciplines into a defined science which would support a standardized approach for continual improvement implementation.
In order to optimize improvement efforts, a conceptual hypothesis is proposed to integrate quality through combining and collaborating implementation efforts of engineering, control, assurance, improvement and costs. The purpose of this thesis is to establish a roadmap to assist in choosing effective quality improvement methodologies and toolsets that assist …
Internet Industry Competition Dynamics: Peering Limitations, Exposure, And Counter Strategies, Seungjae Shin, Jack E. Tucci
Internet Industry Competition Dynamics: Peering Limitations, Exposure, And Counter Strategies, Seungjae Shin, Jack E. Tucci
Journal of International Technology and Information Management
The Internet industry is vertically integrated with Internet Backbone Providers (IBPs) and Internet Service Providers (ISPs.) Although there are many ISPs and IBPs in each stream, both markets are considered independent oligopolies in that there are a few dominant competitors in each market. It is generally accepted that the Internet industry structure has evolved into a four-tier hierarchical structure. The synergistic and codependent nature of the Internet industry is the key element in understanding the competitive environment in which both IBP’s and ISP’s cooperate. Peering is an efficient way to exchange traffic freely within the access tier, nevertheless competitive constraints …
Enterprise Resource Planning (Erp): A Review Of The Literature, Young Moon
Enterprise Resource Planning (Erp): A Review Of The Literature, Young Moon
Mechanical and Aerospace Engineering - All Scholarship
This article is a review of work published in various journals on the topics of Enterprise Resource Planning (ERP) between January 2000 and May 2006. A total of 313 articles from 79 journals are reviewed. The article intends to serve three goals. First, it will be useful to researchers who are interested in understanding what kinds of questions have been addressed in the area of ERP. Second, the article will be a useful resource for searching for research topics. Third, it will serve as a comprehensive bibliography of the articles published during the period. The literature is analysed under six …
More Secure Passwords, Scott Magruder, Stanley X. Lewis Jr
More Secure Passwords, Scott Magruder, Stanley X. Lewis Jr
Journal of International Technology and Information Management
Passwords are often the first line of defense against hackers trying to logon to a user’s account. Due to this, the password that a user selects for protection of their account is critical. These passwords must be “good” passwords that are not easily cracked. However, how does the network administrator enforce this? A simple change to the login process can make the passwords chosen by users much more secure. A description of this simple process is given in this paper. The normal login process is described. A description of the how hackers attempt to crack passwords is given. The simple …
A Framework And Guide For Understanding The Creation Of Consumer Trust, Joseph A. Cazier
A Framework And Guide For Understanding The Creation Of Consumer Trust, Joseph A. Cazier
Journal of International Technology and Information Management
This paper develops a framework and model for building trust by combining research on the creation of trust with the dimensions of trust: ability, benevolence and integrity. By combining these dimensions in a matrix with the types of trust production based on characteristics, process and institutions, the paper develops a robust 3 x 3 matrix with which to categorize and understand trust production. The framework is developed and analyzed in the light of literature on consumer trust. This framework can help researchers, practitioners and consumers understand trust creation and assist businesses in developing a comprehensive strategy for managing trust.
Corporate Blogs Of 40 Fortune 500 Companies: Distribution, Categorization And Characteristics, Shaoyi He, Jake Zhu
Corporate Blogs Of 40 Fortune 500 Companies: Distribution, Categorization And Characteristics, Shaoyi He, Jake Zhu
Journal of International Technology and Information Management
This paper studies corporate blogs as virtual communities, focusing on the distribution, categorization and characteristics of 40 Fortune 500 Companies’ blogs. Firstly, the 40 corporate blogs were classified by industries to see which industries are active advocates of corporate blogs. Secondly, the 40 corporate blogs were first grouped in direct competitor clusters and then categorized into four types of virtual communities: 1) Community of interest, 2) Goal-oriented community of interest, 3) Learner’s community, and 4) Community of practice. Thirdly, eight common elements were identified and compared for each of the 40 corporate blogs to find out their major characteristics. Finally, …
Project Management Practices In The Information Technology Departments Of Various Size Institutions Of Higher Education, Charles R. Johnston, David C. Wierschem
Project Management Practices In The Information Technology Departments Of Various Size Institutions Of Higher Education, Charles R. Johnston, David C. Wierschem
Journal of International Technology and Information Management
The demand for information technology at institutions of higher education is increasing at a rapid pace. It is fueled by student, faculty, and administrative needs. This paper examines project management practices at these institutions with respect to the sizes of the institutions. Survey results indicate an emphasis on operational concerns at small and medium size institutions when selecting IT projects. The prominence of the role of project manager and adoption of formal PM tools/techniques by IT departments generally increase with the sizes of the institutions. The importance of having a project plan is recognized by all sizes of institutions of …
Discovering Software Reliability Patterns Based On Multiple Software Projects, Yi Liu, Gerald Adkins, Jeng-Foung Yao, Gita Williams
Discovering Software Reliability Patterns Based On Multiple Software Projects, Yi Liu, Gerald Adkins, Jeng-Foung Yao, Gita Williams
Journal of International Technology and Information Management
Discovering patterns that indicate software reliability provides valuable information to software project managers. Software Quality Classification (SQC) modeling is a methodology that can be used to discover reliability patterns of large software projects. However, the patterns found by SQC modeling may not be accurate and robust owing to insufficient information used in the training process. This study compares two genetic programming-based SQC models using different volumes of data. These data were extracted from seven different NASA software projects. The results demonstrate that combining data from different projects can produce more accurate and reliable patterns.
Strategic Alliances In Greek Mobile Telephony, Ioanna Stoili, Anastasios A. Economides
Strategic Alliances In Greek Mobile Telephony, Ioanna Stoili, Anastasios A. Economides
Journal of International Technology and Information Management
The mobile telephony market is a very competitive market. Mobile telephony companies try to expand by forming strategic alliances with companies from various industries. The objective of this paper is to analyze the motives, the actions and the results of the collaborations and alliances of two Greek mobile telephony companies (Cosmote and Vodafone Hellas). In addition, this paper illustrates examples of how the technology change and the technological convergence (Internet, computers, and mobile telephony) affected and activated the proliferation of these alliances. The entry of I-mode and Vodafone Live! in the Greek market caused an increase in the number of …
Improving Credit Card Operations With Data Mining Techniques, Malini Krishnamurthi
Improving Credit Card Operations With Data Mining Techniques, Malini Krishnamurthi
Journal of International Technology and Information Management
Consumer credit is ubiquitous and lending poses credit risk – the risk of economic loss due to the failure of a borrower to repay according to the terms of his or her contract with the lender. And so, managing credit risk entails estimating the potential ability of borrowers to repay their debts. Researchers have sought to identify factors that contribute to consumer risk, by using quantitative models. However, the presence of data mining techniques to identify credit risk cannot be ignored. There is a paucity of research to demonstrate the use of data mining techniques in this context, and such …
Application Of Uml For Modeling Urban Traffic System Using Producer Consumer Theory To Generate Process Algebra Model, Manuj Darbari, Sanjay Medhavi, Abhay Kumar Srivastava
Application Of Uml For Modeling Urban Traffic System Using Producer Consumer Theory To Generate Process Algebra Model, Manuj Darbari, Sanjay Medhavi, Abhay Kumar Srivastava
Journal of International Technology and Information Management
UML is widely used as an industry standard for modeling any system. In this paper will be dealing with simple UML diagrams and show that low it can be transformed into process algebra models specially designated to model urban traffic systems. The model capture functionality at the level of mesoscopic as well as microscopic level and it is merged with process algebra’s producer consumer theory. The model is also formalized using Process algebra equations. This paper focuses on complex situational activity diagrams enhancing the expressivity by refining at the abstraction levels. Performance requirement is annotated by the UML profile for …
Integrating It-Enabled Social Networks With Transaction Cost Economics And The Resource Based View Of The Firm, Ganesh D. Bhatt, Jatinder N. D. Gupta, Sushil K. Sharma
Integrating It-Enabled Social Networks With Transaction Cost Economics And The Resource Based View Of The Firm, Ganesh D. Bhatt, Jatinder N. D. Gupta, Sushil K. Sharma
Journal of International Technology and Information Management
Prior research has mostly focused on transaction cost economics (TCE) to interpret the effect of information systems (IS) on organizational governance structures. A TCE based approach predicts that information technology (IT) will lead to increased use of electronic markets to coordinate economic transactions from electronic hierarchies. However, there is contradictory evidence in the literature regarding the rise and importance of cooperative relationships, joint ventures, and value-added partnerships integrated through information systems. To reconcile these contradictions, this paper analyzes the effect of IT on governance structures based on the TCE, social network theory, and the resource based view (RBV) of the …
The Role Of Quantitative Analysis In The Information Security Systems Development Lifecycle, Stephen R. Rosenkranz, Michael E. Busing, Faye P. Teer, Karen A. Forcht
The Role Of Quantitative Analysis In The Information Security Systems Development Lifecycle, Stephen R. Rosenkranz, Michael E. Busing, Faye P. Teer, Karen A. Forcht
Journal of International Technology and Information Management
Today’s numerous Quantitative Analysis (QA) tools have been successfully utilized to solve business problems in diverse applications. However, the application of QA tools in solving information security problems has been sparse. Devising the means and ways to use QA tools in resolving industry-wide security problems has the potential to yield enormous global economic benefit. The purpose of this paper is to explore the use of QA tools as a means of improving the processes involved in the Information Security Systems Development Lifecycle (SecSDL). Information security professionals use the SecSDL as a guide for formulating a comprehensive information security program. The …
An Application Of The Deming Management Method For Information Technology Projects, Jack T. Marchewka
An Application Of The Deming Management Method For Information Technology Projects, Jack T. Marchewka
Journal of International Technology and Information Management
Although the ideas and teachings of W. Edwards Deming have been implemented in organizations world- wide for over the past 50 years, only three studies have empirically tested a theoretical model grounded in the Deming Management Method. These studies focused on the manufacturing and services area. Today, quality management continues to be an area of interest both in project management and software engineering. The focus of this study is to test the Deming Management Method in information technology (IT) projects. A survey of 63 IT professionals provides empirical support for the Deming Management Method and its application to IT projects. …
In Search Of Factors To Online Game Addiction And Its Implications, Yangil Park, Jeng-Chung V. Chen
In Search Of Factors To Online Game Addiction And Its Implications, Yangil Park, Jeng-Chung V. Chen
Journal of International Technology and Information Management
Research has explored online users who are hooked on Internet applications such as chat rooms, web surfing, and interactive games. Online game addiction is one of the problems arisen from the use of the Internet. This study is motivated by a causal connection found from previous research of computer game addiction. The study describes two typical types of online games and looks further into the causes of the addiction by using two main theories. We also propose research hypotheses and discuss possible implications of online game addiction.
Social Network Enhanced Digital City Management And Innovation Success: A Prototype Design, Bih-Ru Lea, Wen-Bin Yu, Prashanth Kannan
Social Network Enhanced Digital City Management And Innovation Success: A Prototype Design, Bih-Ru Lea, Wen-Bin Yu, Prashanth Kannan
Journal of International Technology and Information Management
Innovation is the process by which knowledge is transformed into products and services which in turn fuels economic development to create wealth and generates improvements in the standard of living. With the advance of technology, social networks that play a fundamental role as a medium for the spread of information, ideas, and influence among its members have taken a form of digital city to offer a range of online services, including access to social environments, community services, and e-commerce to its infohabitants. This study investigates how social network theories can be used to design and manage a web-based digital city …