Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences

PDF

2011

Institution
Keyword
Publication
Publication Type

Articles 1 - 30 of 102

Full-Text Articles in Business

Technology Enhanced Learning: Students' Views, Eileen O'Donnell, Mary Sharp Dec 2011

Technology Enhanced Learning: Students' Views, Eileen O'Donnell, Mary Sharp

Eileen O'Donnell

User feedback is very important in all areas of computer science especially in the development of computer applications. Hence, student feedback on the use of technology enhanced learning in higher education in Ireland is relevant to the quality of the learning resources to be created by learning designers and academics in the future. The book “Student Reactions to Learning with Technologies: Perceptions and Outcomes” (Moyle & Wijngaards, 2012) was published by IGI Global in October 2011. This book includes contributions from various authors who are interested in students’ feedback regarding how technology has impacted on their educational experience. This book …


User Choice Between Traditional And Computerized Methods: An Activity Perspective, Jun Sun Dec 2011

User Choice Between Traditional And Computerized Methods: An Activity Perspective, Jun Sun

Information Systems Faculty Publications and Presentations

Numerous computerized methods emerge to replace traditional methods in people’s personal, work and social lives, but many are hesitant to make the transition. This study examines the factors that influence human choice between different methods. According to Activity Theory, traditional and computerized methods are both tools that a person uses for a certain task. The situated experiences with various methods shape people’s attitude toward using them later in terms of tool readiness. The understanding leads to hypothesized relationships between user-, method- and task-specific factors and the dependent variable. The results from an empirical study support that method experiences have strong …


The Value Of Government Mandated Location-Based Services In Emergencies In Australia, Anas Aloudat, Katina Michael, Roba Abbas, Mutaz M. Al-Debei Dec 2011

The Value Of Government Mandated Location-Based Services In Emergencies In Australia, Anas Aloudat, Katina Michael, Roba Abbas, Mutaz M. Al-Debei

Dr. Mutaz M. Al-Debei

The adoption of mobile technologies for emergency management has the capacity to save lives. In Australia in February 2009, the Victorian Bushfires claimed 173 lives, the worst peace-time disaster in the nation’s history. The Australian government responded swiftly to the tragedy by going to tender for mobile applications that could be used during emergencies, such as mobile alerts and location services. These applications, which are becoming increasingly accurate with the evolution of positioning techniques, have the ability to deliver personalized information direct to the citizen during crises, complementing traditional broadcasting mediums like television and radio. Indeed governments have a responsibility …


Content Contribution Under Revenue Sharing And Reputation Concern In Social Media: The Case Of Youtube, Qian Tang, Bin Gu, Andrew B. Whinston Dec 2011

Content Contribution Under Revenue Sharing And Reputation Concern In Social Media: The Case Of Youtube, Qian Tang, Bin Gu, Andrew B. Whinston

Research Collection School Of Computing and Information Systems

A key feature of social media is that it allows individuals and businesses to contribute contents for public viewing. However, little is known about how content providers derive payoffs from such activities. In this study, we build a dynamic structural model to recover the utility function for content providers. Our model distinguishes short-term payoffs based on ad revenue sharing from long-term payoffs driven by content providers’ reputation. The model was estimated using a panel data of 914 top 1000 providers and 381 randomly selected providers on YouTube from Jun 7th, 2010, to Aug 7th, 2011. The two different sets of …


Value Relevance Of Blog Visibility, Nan Hu, Ling Liu, Arindam Tripathy, Lee J. Yao Dec 2011

Value Relevance Of Blog Visibility, Nan Hu, Ling Liu, Arindam Tripathy, Lee J. Yao

Research Collection School Of Computing and Information Systems

This study empirically examines the effect of a non-traditional information source, namely a firm's blog visibility on the capital market valuation of firms. After controlling for earnings, book value of equity and other value relevant variables, such as traditional media exposure, R&D spending, and advertising expense, we find a positive association between a firm's blog visibility and its capital market valuation. In addition, we find blog visibility Grange causes trading, not vice versa. Our findings indicate that non-traditional information sources such as blogs help disseminate information and influence consumers' investment decisions by capturing their attention.


Assessing The Impact Of Recommendation Agents On On-Line Consumer Unplanned Purchase Behavior, R. Eric Hostler, Victoria Y. Yoon, Zhiling Guo, Tor Guimaraes, Guisseppi Forgionne Dec 2011

Assessing The Impact Of Recommendation Agents On On-Line Consumer Unplanned Purchase Behavior, R. Eric Hostler, Victoria Y. Yoon, Zhiling Guo, Tor Guimaraes, Guisseppi Forgionne

Research Collection School Of Computing and Information Systems

Recommendation agents (RAs) have been used by many Internet businesses such as Amazon and Netflix. However, few authors have studied how consumer behavior is affected by those that make suggestions to online consumers based on their recent shopping behavior. Fewer still have examined the role that RAs play in influencing impulse purchasing decisions online. Our study developed a theoretical model to illustrate the impact of RAs on online consumer behavior. The model was tested through an online shopping simulation which used a collaborative filtering based product RA. Particular attention was paid to the effects of an RA on consumer behavior; …


The Valuation Of User-Generated Content: A Structural, Stylistic And Semantic Analysis Of Online Reviews, Noi Sian Koh Dec 2011

The Valuation Of User-Generated Content: A Structural, Stylistic And Semantic Analysis Of Online Reviews, Noi Sian Koh

Dissertations and Theses Collection (Open Access)

The ability and ease for users to create and publish content has provided vast amount of online product reviews. However, the amount of data is overwhelmingly large and unstructured, making information difficult to quantify. This creates challenge in understanding how online reviews affect consumers’ purchase decisions. In my dissertation, I explore the structural, stylistic and semantic content of online reviews. Firstly, I present a measurement that quantifies sentiments with respect to a multi-point scale and conduct a systematic study on the impact of online reviews on product sales. Using the sentiment metrics generated, I estimate the weight that customers place …


Four Perspectives On Architectural Strategy, C. Jason Woodard, Joel West Dec 2011

Four Perspectives On Architectural Strategy, C. Jason Woodard, Joel West

Research Collection School Of Computing and Information Systems

A recurring theme in the literature on technology and organizations is the concept of mirroring, which posits a duality between technological and organizational design decisions. In this paper we highlight a second, orthogonal duality between components and interfaces: designers of both products and organizations must decide what information to hide within component boundaries and what to expose to other designers. Although the component-interface duality appears in many settings, it presents especially vexing strategic challenges in the design and production of complex digital artifacts. We present a typology of four interlinked perspectives on these kinds of strategic design problems, and discuss …


New Theories And Methods For Technology Adoption Research, Robert J. Kauffman, Angsana A. Techatassanasoontorn Dec 2011

New Theories And Methods For Technology Adoption Research, Robert J. Kauffman, Angsana A. Techatassanasoontorn

Research Collection School Of Computing and Information Systems

This special issue includes six articles on different aspects of technology adoption that represent the development and application of different theoretical and methodological approaches to the business problems that they treat. In terms of theory, three of the articles use behavioral and organizational theories, including adaptive structuration theory, management fashion theory, the unified theory of technology acceptance, the technology acceptance model, and diffusion of innovation theory. The other two are based on economic theory, including network effects theory, and economic growth theory. The methods used are also dramatically different in each of the studies. Three studies use field research and …


From Primordial Soup To Platform-Based Competition: Exploring The Emergence Of Products, Systems, And Platforms, C. Jason Woodard, Eric K. Clemons Dec 2011

From Primordial Soup To Platform-Based Competition: Exploring The Emergence Of Products, Systems, And Platforms, C. Jason Woodard, Eric K. Clemons

Research Collection School Of Computing and Information Systems

We use an agent-based NK model to explore the conditions under which standard platforms emerge among competing products. Our findings were inconclusive. We find that the usual Darwinian conditions needed for the emergence of complexity are sufficient to yield a limited reliance upon platforms with a core of common components, simply because evolution causes the population to converge on a set of products that contain combinations that "work well," yielding what we call "coincidental platform emergence." Economies of scale yield more use of common components, or "production platform emergence." Positive participation externalities initially induce the highest degree of platform emergence …


Agile Innovation Management, Arcot Desai Narasimhalu Nov 2011

Agile Innovation Management, Arcot Desai Narasimhalu

Research Collection School Of Computing and Information Systems

The volume and velocity of innovations are on the increase resulting in increased pressures on every company for attaining, retaining and increasing its market leadership. Many companies need to retool their innovation management processes to address two agility related objectives in order to survive and grow in such a rapidly changing innovation environment. The first objective would be the ability to assemble an innovation team within the shortest possible time. This can only be satisfied by companies that are capable of forming innovation teams rather quickly. The related second objective would be to reduce the I2M (Idea to Market) cycle …


The Social And Behavioral Implications Of Location-Based Services, Katina Michael, M.G. Michael Nov 2011

The Social And Behavioral Implications Of Location-Based Services, Katina Michael, M.G. Michael

Associate Professor Katina Michael

The social and behavioral implications of location-based services (LBS) are only now beginning to come to light in advanced markets where the services have been adopted by just a little over half the market (Microsoft 2011). Depending on one’s definition of what constitutes location-based services, statistics on the level of adoption differ considerably. While it is helpful to provide as broad a list of applications as possible in what constitutes LBS (e.g. everything from in-vehicle navigation systems to downloading a map using a computer), it can also cloud the real picture forming behind this emerging technology. Emerging not in the …


No Fear: Leadership, "Digital Cowboys" And The "Playstation Generation", Singapore Management University Nov 2011

No Fear: Leadership, "Digital Cowboys" And The "Playstation Generation", Singapore Management University

Perspectives@SMU

Finnish entrepreneur Pekka Viljakainen would be considered as successful by most measures. At only 38 years of age, he has managed a staff of 8,000 across 20 countries from Munich. His information technology (IT) consultancy, Oy Visual Systems, had merged with Tieto, another European IT firm, and Viljakainen was made executive vice-president.


Profit-Maximizing Firm Investments In Customer Information Security, Yong Yick Lee, Robert J. Kauffman, Ryan Sougstad Nov 2011

Profit-Maximizing Firm Investments In Customer Information Security, Yong Yick Lee, Robert J. Kauffman, Ryan Sougstad

Research Collection School Of Computing and Information Systems

When a customer interacts with a firm, extensive personal information often is gathered without the individual's knowledge. Significant risks are associated with handling this kind of information. Providing protection may reduce the risk of the loss and misuse of private information, but it imposes some costs on both the firm and its customers. Nevertheless, customer information security breaches still may occur. They have several distinguishing characteristics: (1) typically it is hard to quantify monetary damages related to them; (2) customer information security breaches may be caused by intentional attacks, as well as through unintentional organizational and customer behaviors; and (3) …


Managing Successive Generation Product Diffusion In The Presence Of Strategic Consumers, Zhiling Guo Nov 2011

Managing Successive Generation Product Diffusion In The Presence Of Strategic Consumers, Zhiling Guo

Research Collection School Of Computing and Information Systems

Frequent new product release and technological uncertainty about the release time pose significant challenges for firms to manage successive generation of products. On the one hand, strategic consumers may delay their purchase decision and substitute the earlier generation with the newer generation product. On the other hand, the firm must fully anticipate consumer reactions and take into account the effect of their strategic behavior on product pricing and successive generation product diffusion. This paper proposes a prediction market to forecast new product release. We show that the market information aggregation mechanism can improve forecast accuracy of new product launch. Better …


Deployment Evaluation Of Accounting Information Systems In Libyan Commercial Banks, Omar Sharkasi, Martin George Wynn Nov 2011

Deployment Evaluation Of Accounting Information Systems In Libyan Commercial Banks, Omar Sharkasi, Martin George Wynn

The African Journal of Information Systems

This article reports on the recent implementation and current deployment of accounting information systems in Libyan commercial banks. A case study approach is adopted that moves from an initial screening of the 14 main Libyan banks to a final in-depth study of just three banks. Business process modeling and systems profiling are used to assess the status of the banks in terms of systems use, process change and information systems strategy development. Libyan banks are well advanced in their installation of modern packaged software but could be used to greater effect to optimize business processes and improve efficiencies. Training and …


Are There Contagion Effects In Information Technology And Business Process Outsourcing?, Arti Mann, Robert J. Kauffman, Kunsoo Han, Barrie R. Nault Nov 2011

Are There Contagion Effects In Information Technology And Business Process Outsourcing?, Arti Mann, Robert J. Kauffman, Kunsoo Han, Barrie R. Nault

Research Collection School Of Computing and Information Systems

We model the diffusion of IT outsourcing using announcements about IT outsourcing deals. We estimate a lognormal diffusion curve to test whether IT outsourcing follows a pure diffusion process or there are contagion effects involved. The methodology permits us to study the consequences of outsourcing events, especially mega-deals with IT contract amounts that exceed US$1 billion. Mega-deals act, we theorize, as precipitating events that create a strong basis for contagion effects and are likely to affect decision-making by other firms in an industry. Then, we evaluate the role of different communication channels in the diffusion process of IT outsourcing by …


Price Points And Price Rigidity, Daniel Levy, Dongwon Lee, Haipeng (Allen) Lee, Robert J. Kauffman, Mark Bergen Nov 2011

Price Points And Price Rigidity, Daniel Levy, Dongwon Lee, Haipeng (Allen) Lee, Robert J. Kauffman, Mark Bergen

Research Collection School Of Computing and Information Systems

We study the link between price points and price rigidity using two data sets: weekly scanner data and Internet data. We find that ‘‘9’’ is the most frequent ending for the penny, dime, dollar, and ten-dollar digits; the most common price changes are those that keep the price endings at ‘‘9’’; 9-ending prices are less likely to change than non-9-ending prices; and the average size of price change is larger for 9-ending than non-9- ending prices. We conclude that 9-ending contributes to price rigidity from penny to dollar digits and across a wide range of product categories, retail formats, and …


A Critical Review Of The Effectiveness Of Fiscal And Monetary Policies In The Pacific Island Countries (Pics) Between 1990-2010, Deogratias Harorimana Mr Oct 2011

A Critical Review Of The Effectiveness Of Fiscal And Monetary Policies In The Pacific Island Countries (Pics) Between 1990-2010, Deogratias Harorimana Mr

Dr Deogratias Harorimana

The purpose of this paper is to critically assess the effectiveness of Fiscal and Monetary Policies in the South Pacific Island Countries. The paper tracks down the economic growth for the last 20 years between 1990-2010, and drawing from key fiscal and monetary policies in place during the time under consideration, as well as specific interventions in the region, we find that: 1) While the South Pacific Island Countries (SPICs) particularly the six major economies (Solomon Islands, Fiji, Vanuatu, PNG, Samoa, Tonga) pursued fiscal and monetary policies for promoting growth and diversification of their economies, their fiscal policies relied heavily …


Identifying Social Influence In Networks Using Randomized Experiments, Sinan Aral, Dylan Walker Oct 2011

Identifying Social Influence In Networks Using Randomized Experiments, Sinan Aral, Dylan Walker

Business Faculty Articles and Research

The recent availability of massive amounts of networked data generated by email, instant messaging, mobile phone communications, micro blogs, and online social networks is enabling studies of population-level human interaction on scales orders of magnitude greater than what was previously possible.1'2 One important goal of applying statistical inference techniques to large networked datasets is to understand how behavioral contagions spread in human social networks. More precisely, understanding how people influence or are influenced by their peers can help us understand the ebb and flow of market trends, product adoption and diffusion, the spread of health behaviors such as smoking and …


Issues In Human Capital Development : Lessons For Public Administration And Governance, Deogratias Harorimana Mr Oct 2011

Issues In Human Capital Development : Lessons For Public Administration And Governance, Deogratias Harorimana Mr

Dr Deogratias Harorimana

With few minerals or other natural resources, Rwanda believes that she can still achieve her ambitions by investing in human capital - her unique resource. If this ambition can be achieved, then is this the next role model for international development? We used a case study design and analysis methods to examine development models used elsewhere in recent decades, using both qualitative and quantitative data on Rwanda to establish the comparative advantages in relation to Singapore’s economic development model. The implications for international development are that (1) an effective human capital development strategy should be inclusive enough to respond to …


Strategic Responses To Standardization: Embrace, Extend Or Extinguish?, C. Jason Woodard, Joel West Oct 2011

Strategic Responses To Standardization: Embrace, Extend Or Extinguish?, C. Jason Woodard, Joel West

Research Collection School Of Computing and Information Systems

Prior research on technology standardization has focused on two common patterns: processes in which product developers and other stakeholders cooperate to achieve a consensus outcome, and “standards wars” in which competing technologies vie for dominance in the market. This study examines Microsoft's responses to 12 software technologies in the period between 1990 and 2005. Despite the company's reputed tendency to pursue a strategy dubbed “embrace, extend, and extinguish,” a content analysis of news articles from the same period reveals surprising diversity in Microsoft's responses at the product level.

We classify these responses using a typology that treats “embrace” and “extend” …


Allocating Resources In Multiagent Flowshops With Adaptive Auctions, Hoong Chuin Lau, Zhengyi Zhao, Sam Shuzhi Ge, Thong Heng Lee Oct 2011

Allocating Resources In Multiagent Flowshops With Adaptive Auctions, Hoong Chuin Lau, Zhengyi Zhao, Sam Shuzhi Ge, Thong Heng Lee

Research Collection School Of Computing and Information Systems

In this paper, we consider the problem of allocating machine resources among multiple agents, each of which is responsible to solve a flowshop scheduling problem. We present an iterated combinatorial auction mechanism in which bid generation is performed within each agent, while a price adjustment procedure is performed by a centralized auctioneer. While this approach is fairly well-studied in the literature, our primary innovation is in an adaptive price adjustment procedure, utilizing variable step-size inspired by adaptive PID-control theory coupled with utility pricing inspired by classical microeconomics. We compare with the conventional price adjustment scheme proposed in Fisher (1985), and …


Recommendations For Australia’S Implementation Of The National Emergency Warning System Using Location-Based Services, Anas Aloudat, Katina Michael, Roba Abbas Sep 2011

Recommendations For Australia’S Implementation Of The National Emergency Warning System Using Location-Based Services, Anas Aloudat, Katina Michael, Roba Abbas

Professor Katina Michael

Mobile alerts, notifications and location-based emergency warning systems are now an established part of mobile government strategies in an increasing number of countries worldwide. In Australia the national emergency warning system (NEWS) was instituted after the tragic Black Saturday Victorian Bushfires of February 2009. In the first phase, NEWS has enabled the provision of public information from the government to the citizen during emergencies anywhere and any time. Moving on from traditional short message service (SMS) notifications and cell broadcasting to more advanced location-based services, this paper provides executive-level recommendations about the viability of location-based mobile phone services in NEWS …


The Human Computer Interaction Issues Associated With The Creation Of Personalized Role Playing Simulations, Eileen O'Donnell, Catherine Mulwa, Mary Sharp, Vincent Wade Sep 2011

The Human Computer Interaction Issues Associated With The Creation Of Personalized Role Playing Simulations, Eileen O'Donnell, Catherine Mulwa, Mary Sharp, Vincent Wade

Eileen O'Donnell

The human computer interaction issues associated with the creation of personalized role playing simulations are discussed in this paper. This paper is aimed at those who are interested in building authoring applications which enable educators to build role playing simulated e-learning resources to use with their students. One of the main issues which have come to our attention is that many learning designers and educators do not understand what exactly it is we are trying to achieve by creating personalized role playing simulations. Also, how to gauge the pedagogic merits which can be achieved by using these e-learning resources. Potential …


The Fall-Out From Emerging Technologies: On Matters Of Surveillance, Social Networks And Suicide, M.G. Michael, Katina Michael Aug 2011

The Fall-Out From Emerging Technologies: On Matters Of Surveillance, Social Networks And Suicide, M.G. Michael, Katina Michael

M. G. Michael

No abstract provided.


Waldo In The Light Of Austerity And Federal Debt Crisis, Part 2, Jan Kallberg Aug 2011

Waldo In The Light Of Austerity And Federal Debt Crisis, Part 2, Jan Kallberg

Jan Kallberg

Waldo’s predictions about the future for public administration describe five areas that would be problematic in the future: legitimacy, authority, knowledge, control, and confidence. Legitimacy includes not only that the government is legally legitimized but capable and focused on an intention to deliver the “good society.” Authority, according to Waldo, is the ability to implement policy with the acceptance of the people based on rationalism, expectations of public good, ethics, superior knowledge, and institutional contexts. Knowledge is institutional knowledge, the ability to arrange and utilize knowledge within the bureaucracy since coordination is the major challenge in knowledge management. Government has …


Waldo In The Light Of Austerity And Federal Debt Crisis, Part 1, Jan Kallberg Aug 2011

Waldo In The Light Of Austerity And Federal Debt Crisis, Part 1, Jan Kallberg

Jan Kallberg

Dwight Waldo wrote The Enterprise of Public Administration in 1979 looking back on a long and fruitful academic career, but also as a reflection about the future for public administration. Can a 30 year old book still be relevant? You bet. Today, the public sector is increasingly facing fiscal challenges. Federal, state, and local governments throughout the country have major budget deficits followed by austerity measures that undermine the ability to deliver the good life of the future. In this day and age rereading Dwight Waldo’s The Enterprise of Public Administration is an intellectual exercise worth pursuing. Several of Dwight …


Taxisim: A Multiagent Simulation Platform For Evaluating Taxi Fleet Operations, Shih-Fen Cheng, Thi Duong Nguyen Aug 2011

Taxisim: A Multiagent Simulation Platform For Evaluating Taxi Fleet Operations, Shih-Fen Cheng, Thi Duong Nguyen

Research Collection School Of Computing and Information Systems

Taxi service is an important mode of public transportation in most metropolitan areas since it provides door-to-door convenience in the public domain. Unfortunately, despite all the convenience taxis bring, taxi fleets are also extremely inefficient to the point that over 50% of its operation time could be spent in idling state. Improving taxi fleet operation is an extremely challenging problem, not just because of its scale, but also due to fact that taxi drivers are self-interested agents that cannot be controlled centrally. To facilitate the study of such complex and decentralized system, we propose to construct a multiagent simulation platform …


Networks - Ii: Error Estimation In Angle Of Arrival In Smart Antenna, Sangita Lalchand, Muhammad Mazhar Manzoor, Amir Ijaz, Imran Ahmed Awan, Asad Ali Siddique Jul 2011

Networks - Ii: Error Estimation In Angle Of Arrival In Smart Antenna, Sangita Lalchand, Muhammad Mazhar Manzoor, Amir Ijaz, Imran Ahmed Awan, Asad Ali Siddique

International Conference on Information and Communication Technologies

Rapidly growing demand in mobile communication system required technology which will provide minimum errors and maximize SNR in a particular angle/direction. Smart antenna has a system for directed a beam towards desired angle/direction and suppress/cancel interference from undesired angle/direction. MUSIC (Multiple Signal Classification) has capability to estimate number of signals in an array and angle/direction of arrival of desired signal. ESPRIT (Estimation of Signal Parameters via Rotational Invariance Techniques) is used for the estimation of direction of arrival of multiple sets of identical doublets, provides parallel processing. This Paper provides comparative analysis and simulation of angle of arrival (AOA) estimation, …