Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences

Selected Works

Institution
Keyword
Publication Year
Publication
File Type

Articles 31 - 60 of 359

Full-Text Articles in Business

Synergy And Its Limits In Managing Information Technology Professionals, Thomas W. Ferratt, Jayesh Prasad, Harvey Enns Aug 2016

Synergy And Its Limits In Managing Information Technology Professionals, Thomas W. Ferratt, Jayesh Prasad, Harvey Enns

Thomas Ferratt

We examine the effects of human resource management (HRM) practices (e.g., career development, social support, compensation, and security) on IT professionals‟ job search behavior. Job search is a relatively novel dependent variable in studies of voluntary withdrawal behavior, in general, and for IT professionals, in particular. From a universalistic perspective, HRM practices individually and in combination exhibit independently additive effects on job search behavior. Our study contrasts this perspective with configurational theory, hypothesizing that proposed idealtype configurations of HRM practices have synergistic effects on job search behavior. We contribute to the IT and broader HRM literature by theoretically explicating and …


A Virtual Environment For Enterprise Engineering Education, Can Saygin, Benjamin Dow, Raymond Kluczny, Majdi Najm, Scott Grasman Jan 2016

A Virtual Environment For Enterprise Engineering Education, Can Saygin, Benjamin Dow, Raymond Kluczny, Majdi Najm, Scott Grasman

Dow Scott

Several resources highlight the need to effectively use modern technology to gain more productive and rewarding undergraduate science, mathematics, engineering, and technology education. In addition to the growth of information technology, the importance of hands-on practice and active learning has been highlighted in various resources. These factors, coupled with inadequate and insufficient real-world experiences in undergraduate education, have become a major reason for under-qualified and under-employed graduates. This paper discusses the creation of the University of Missouri Virtual Enterprise, which provides context for development of learning modules for enterprise engineering education. This approach will improve the undergraduate education experience by …


Robust Distributed Scheduling Via Time Period Aggregation, Shih-Fen Cheng, John Tajan, Hoong Chuin Lau Dec 2015

Robust Distributed Scheduling Via Time Period Aggregation, Shih-Fen Cheng, John Tajan, Hoong Chuin Lau

Shih-Fen Cheng

In this paper, we evaluate whether the robustness of a market mechanism that allocates complementary resources could be improved through the aggregation of time periods in which resources are consumed. In particular, we study a multi-round combinatorial auction that is built on a general equilibrium framework. We adopt the general equilibrium framework and the particular combinatorial auction design from the literature, and we investigate the benefits and the limitation of time-period aggregation when demand-side uncertainties are introduced. By using simulation experiments on a real-life resource allocation problem from a container port, we show that, under stochastic conditions, the performance variation …


Robust Distributed Scheduling Via Time Period Aggregation, Shih-Fen Cheng, John Tajan, Hoong Chuin Lau Dec 2015

Robust Distributed Scheduling Via Time Period Aggregation, Shih-Fen Cheng, John Tajan, Hoong Chuin Lau

Shih-Fen Cheng

In this paper, we evaluate whether the robustness of a market mechanism that allocates complementary resources could be improved through the aggregation of time periods in which resources are consumed. In particular, we study a multi-round combinatorial auction that is built on a general equilibrium framework. We adopt the general equilibrium framework and the particular combinatorial auction design from the literature, and we investigate the benefits and the limitation of time-period aggregation when demand-side uncertainties are introduced. By using simulation experiments on a real-life resource allocation problem from a container port, we show that, under stochastic conditions, the performance variation …


Robust Distributed Scheduling Via Time Period Aggregation, Shih-Fen Cheng, John Tajan, Hoong Chuin Lau Dec 2015

Robust Distributed Scheduling Via Time Period Aggregation, Shih-Fen Cheng, John Tajan, Hoong Chuin Lau

Shih-Fen CHENG

In this paper, we evaluate whether the robustness of a market mechanism that allocates complementary resources could be improved through the aggregation of time periods in which resources are consumed. In particular, we study a multi-round combinatorial auction that is built on a general equilibrium framework. We adopt the general equilibrium framework and the particular combinatorial auction design from the literature, and we investigate the benefits and the limitation of time-period aggregation when demand-side uncertainties are introduced. By using simulation experiments on a real-life resource allocation problem from a container port, we show that, under stochastic conditions, the performance variation …


Effect Of Retiring Custom Web Applications On Business And Information Technology Alignment, Shubhashree Thekahally Nov 2015

Effect Of Retiring Custom Web Applications On Business And Information Technology Alignment, Shubhashree Thekahally

Shubhashree Thekahally 7340504

Web applications provide the information technology (IT) implementation of business and align IT with business. Retirement of IT applications should ensure stability of business and IT alignment. The current study investigated the alignment gaps created between business and IT resulting from retiring IT software applications. The purpose of this study was to identify IT integration points with business and provide a process-based solution that sustained IT alignment with business after retiring IT applications. The theoretical framework strategic alignment model aided in identifying 3 IT domains as the IT integration points with business: enterprise architecture, configuration management database, and service-level agreement. …


Enhancing Manufacturing Planning And Control Systems Through Artificial Intelligence Techniques, Ronald S. Dattero, John J. Kanet, Edna M. White Sep 2015

Enhancing Manufacturing Planning And Control Systems Through Artificial Intelligence Techniques, Ronald S. Dattero, John J. Kanet, Edna M. White

John J. Kanet

Manufacturing planning and control systems are currently dominated by systems based upon Material Requirements Planning (MRP). MRP systems have a number of fundamental flaws. A potential alternative to MRP systems is suggested after research into the economic batch scheduling problem. Based on the ideas of economic batch scheduling, and enhanced through artificial intelligence techniques, an alternative approach to manufacturing planning and control is developed. A framework for future research on this alternative to MRP is presented.


Production Planning And Control Systems-State Of The Art And New Directions, V. Sridharan, John Kanet Sep 2015

Production Planning And Control Systems-State Of The Art And New Directions, V. Sridharan, John Kanet

John J. Kanet

This chapter begins with a description of the role of production planning and control (PPC) within the manufacturing function. After discussing the impact of the operating environment on the choice a system for PPC, we describe some recent empirical evidence regarding the use and performance results of various PPC systems. This is followed by a brief overview of the two most widely used systems for production planning and control. We then describe a recent development in the area of short-term detailed scheduling exploiting the latest developments in computing technology. The chapter concludes with a discussion of an emerging paradigm for …


Operations Research For Freight Train Routing And Scheduling, Steven Harrod, Michael Gorman Sep 2015

Operations Research For Freight Train Routing And Scheduling, Steven Harrod, Michael Gorman

Michael F. Gorman

This article describes the service design activities that plan and implement the rail freight operating plan. Elements of strategic service design include the setting of train frequency, the routing of cars among trains, and the consolidation of cars, called blocking. At the operational level, trains are dispatched either according to train paths configured in advance, called timetables, or according to priority rules. We describe the North American and European practice along with selected modeling and problem solving methodologies appropriate for each of the operating conditions described.


Operations Research Approaches In Asset Management In Freight Rail, Michael Gorman, Steven Harrod Sep 2015

Operations Research Approaches In Asset Management In Freight Rail, Michael Gorman, Steven Harrod

Michael F. Gorman

This article describes operations research methodologies as they apply to asset management in freight rail. We describe state-of-the-art methods for locomotive, crew, rail-car, line and yard planning and management. We conclude with emerging areas of research in rail.


Capacity Planning With Financial And Operational Hedging In Low‐Cost Countries, Lijian Chen, Shanling Li, Letian Wang Sep 2015

Capacity Planning With Financial And Operational Hedging In Low‐Cost Countries, Lijian Chen, Shanling Li, Letian Wang

Lance (Lijian) Chen

The authors of this paper outline a capacity planning problem in which a risk-averse firm reserves capacities with potential suppliers that are located in multiple low-cost countries. While demand is uncertain, the firm also faces multi-country foreign currency exposures. This study develops a mean-variance model that maximizes the firm’s optimal utility and derives optimal utility and optimal decisions in capacity and financial hedging size. The authors show that when demand and exchange rate risks are perfectly correlated, a risk- averse firm, by using financial hedging, will achieve the same optimal utility as a risk-neutral firm. In this paper as well, …


A Simulation-Based Approach To Solve A Specific Type Of Chance Constrained Optimization, Lijian Chan Sep 2015

A Simulation-Based Approach To Solve A Specific Type Of Chance Constrained Optimization, Lijian Chan

Lance (Lijian) Chen

We solve the chance constrained optimization with convex feasible set through approximating the chance constraint by another convex smooth function. The approximation is based on the numerical properties of the Bernstein polynomial that is capable of effectively controlling the approximation error for both function value and gradient. Thus, we adopt a first-order algorithm to reach a satisfactory solution which is expected to be optimal. When the explicit expression of joint distribution is not available, we then use Monte Carlo approach to numerically evaluate the chance constraint to obtain an optimal solution by probability. Numerical results for known problem instances are …


Re-Solving Stochastic Programming Models For Airline Revenue Management, Lijian Chen, Tito Homem-De-Mello Sep 2015

Re-Solving Stochastic Programming Models For Airline Revenue Management, Lijian Chen, Tito Homem-De-Mello

Lance (Lijian) Chen

We study some mathematical programming formulations for the origin-destination model in airline revenue management. In particular, we focus on the traditional probabilistic model proposed in the literature. The approach we study consists of solving a sequence of two-stage stochastic programs with simple recourse, which can be viewed as an approximation to a multi-stage stochastic programming formulation to the seat allocation problem. Our theoretical results show that the proposed approximation is robust, in the sense that solving more successive two-stage programs can never worsen the expected revenue obtained with the corresponding allocation policy. Although intuitive, such a property is known not …


Ancillary Service Capacity Optimization For Both Electric Power Suppliers And Independent System Operator, Lijian Chen, Dengfeng Sun, Guang Li Sep 2015

Ancillary Service Capacity Optimization For Both Electric Power Suppliers And Independent System Operator, Lijian Chen, Dengfeng Sun, Guang Li

Lance (Lijian) Chen

Ancillary Services (AS) in electric power industry are critical to support the transmission of energy from generators to load demands while maintaining reliable operation of transmission systems in accordance with good utility practice. The ancillary services are procured by the independent system operator (ISO) through a process called the market clearing process which can be modeled by the partial equilibrium from the ends of ISO. There are two capacity optimization problems for both Market participants (MP) and Independent System Operator (ISO). For a market participant, the firm needs to determine the capacity allocation plan for various AS to pursue operating …


Capacity-Driven Pricing Mechanism In Special Service Industries, Lijian Chen, Suraj M. Alexander Sep 2015

Capacity-Driven Pricing Mechanism In Special Service Industries, Lijian Chen, Suraj M. Alexander

Lance (Lijian) Chen

We propose a capacity driven pricing mechanism for several service industries in which the customer behavior, the price demand relationship, and the competition are significantly distinct from other industries. According our observation, we found that the price demand relationship in these industries cannot be modeled by fitted curves; the customers would neither plan in advance nor purchase the service strategically; and the competition would be largely local. We analyze both risk neutral and risk aversion pricing models and conclude the proposed capacity driven model would be the optimal solution under mild assumptions. The resulting pricing mechanism has been implemented at …


Workshop | Body Worn Video Recorders: The Socio-Technical Implications Of Gathering Direct Evidence, Katina Michael, Alexander Hayes Jun 2015

Workshop | Body Worn Video Recorders: The Socio-Technical Implications Of Gathering Direct Evidence, Katina Michael, Alexander Hayes

Alexander Hayes Mr.

- From in-car video recording to body-worn video recording

- Exploring available technologies: how do they work, pros and cons

- Storing direct evidence in secure storage: factors to consider

- Citizens “shooting” back with POV tech – what are their rights?

- Crowdsourced sousveillance- harnessing public data for forensic profiling

- Police force policies and practices on the application of new media


Smart Cities: Environmental Aspects And Opportunities, Marcus R. Wigan May 2015

Smart Cities: Environmental Aspects And Opportunities, Marcus R. Wigan

Marcus R Wigan

The phrase Smart Cities requires a little discussion before addressing any specific context.
When ICT is involved, the professionals engaged in the technical delivery are focused on possibilities of data capture and integration, rather than – beyond predictive analytics (BiG Data) applications, rather than the organizational context and culture within which such fresh large scale data flows are becoming available.
In this address, where I have been asked to look at Environmental aspects, especially sensors, it is critical that the technical capacities, data capabilities, cultural and organizational aspects are given equal weight, or unrealistic expectations are immediately aroused.
The records …


On Empirical Validation Of Compactness Measures For Electoral Redistricting And Its Significance For Application Of Models In The Social Science, Christine Chou, Steven O. Kimbrough, Frederic H. Murphy, John Sullivan-Fedock, C. Jason Woodard Apr 2015

On Empirical Validation Of Compactness Measures For Electoral Redistricting And Its Significance For Application Of Models In The Social Science, Christine Chou, Steven O. Kimbrough, Frederic H. Murphy, John Sullivan-Fedock, C. Jason Woodard

C. Jason Woodard

Use of optimization models in science and policy applications is often problematic because the best available models are very inaccurate representations of the originating problems. Such is the case with electoral districting models, for which there exist no generally accepted measures of compactness, in spite of many proposals and much analytical study. This article reports on an experimental investigation of subjective judgments of compactness for electoral districts. The experiment draws on a unique database of 116 distinct, legally valid districting plans for the Philadelphia City Council, discovered with evolutionary computation. Subjects in the experiment displayed, in the aggregate, remarkable agreement …


A Right To Cybercounter Strikes: The Risks Of Legalizing Hack Backs, Jan Kallberg Feb 2015

A Right To Cybercounter Strikes: The Risks Of Legalizing Hack Backs, Jan Kallberg

Jan Kallberg

The idea to legalize hacking back has gained traction the last years and received several influential corporate and political proponents in the United States and Europe. The growing frustration with repeated cyberattacks and lack of credible law enforcement pushes for alternative ways to prevent future cyberattacks. As of today, counter cyberattacks are illegal in a majority of the nations because it constitutes another cybercrime independent from the initial attack. If cyber counter attacks were legalized it raises a set of questions. The first line of questions are linked to the underlying assumptions that the proposal to legalize counter cyberattacks are …


Alcts Crs Holdings Information Forum, 3-4 P.M. January 31, 2015, Connie Foster Jan 2015

Alcts Crs Holdings Information Forum, 3-4 P.M. January 31, 2015, Connie Foster

Connie Foster

Cecilia Genereux (data management & access/metadata & intellectual access, University of Minnesota Libraries) introduced the session by confessing to a pun intended for her presentation: Alma: To Have and to Hold. The levity quickly shifted into some very detailed analysis of the way the Ex Libris Alma system handled specific types of serials during a migration from Aleph. The University of Minnesota started with Aleph (Ex Libris) in 2002 and moved to Alma on December 26, 2013. Frances McNamara (director, Integrated Library Systems and Administrative and Desktop Systems at University of Chicago), discussed migrating serials data from Horizon to Kulai …


Data, Analytics And Community-Based Organizations: Transforming Data To Decisions For Community Development, Michael P. Johnson Jr. Dec 2014

Data, Analytics And Community-Based Organizations: Transforming Data To Decisions For Community Development, Michael P. Johnson Jr.

Michael P. Johnson

The past ten years have seen a revolution in two disciplines related to operations and strategy design. “Big Data” has transformed the theory and practice of producing and selling goods and services through methods associated with computer science and information technology. “Analytics” has popularized primarily quantitative models and methods by which organizations and systems can measure multiple aspects of performance. As these fields rely on information technology to collect, store, process and share data, we refer to the collection of knowledge and applications associated with Big Data and analytics as “data analytics and information technology.” The impacts of data analytics …


In Service For Sharing: Leadership And Leader - Follower Relationship Factors As Influencers Of Tacit Knowledge Sharing In The It Industry, Billy Whisnant, Odai Khasawneh Nov 2014

In Service For Sharing: Leadership And Leader - Follower Relationship Factors As Influencers Of Tacit Knowledge Sharing In The It Industry, Billy Whisnant, Odai Khasawneh

Odai Khasawneh

Tacit knowledge is an organizational resource that is difficult to cultivate. It requires that responsible agents in the organization take an active role in encouraging trust and the development of relationships where individuals feel that their voice will be heard and that there will be a benefit from them passing knowledge onto someone else. In knowledge work tacit knowledge is especially important. 

This research found that servant leadership is an important factor in influencing tacit knowledge sharing, however leader-member exchange is a factor that will strongly support the sharing of tacit knowledge. 

If there is a dearth in servant leadership, …


Corporate Security: Using Knowledge Construction To Define A Practising Body Of Knowledge, David Brooks Sep 2014

Corporate Security: Using Knowledge Construction To Define A Practising Body Of Knowledge, David Brooks

David J Brooks Dr.

Security is a multidimensional concept, with many meanings, practising domains, and heterogeneous occupations. Therefore, it is difficult to define security as a singular concept, although understanding may be achieved by its applied context in presenting a domicile body of knowledge. There have been studies that have presented a number of corporate security bodies of knowledge; however, there is still restricted consensus. From these past body of knowledge studies, and supported by multidimensional scaling knowledge mapping, a body of knowledge framework is put forward, integrating core and allied knowledge categories. The core knowledge categories include practise areas such as risk management, …


Personality And Programming, Amy B. Woszczynski, Tracy C. Guthrie, Sherri Shade Jun 2014

Personality And Programming, Amy B. Woszczynski, Tracy C. Guthrie, Sherri Shade

Sherri Shade

Information systems students continue to struggle to successfully complete computer programming classes. Learning how to program is difficult, and failure and attrition rates in college level programming classes remain at an unacceptably high rate. Since many IS students take a programming course as part of their program of study, IS educators should better understand why IS students tend to achieve low success rates in programming courses and what can be done to improve success rates. Little research to date has addressed potential reasons for student failure in programming principles courses. Many educators simply assume that high failure rates are acceptable …


A Call To Is Educators To Respond To The Voices Of Women In Information Security, Amy B. Woszczynski, Sherri Shade Jun 2014

A Call To Is Educators To Respond To The Voices Of Women In Information Security, Amy B. Woszczynski, Sherri Shade

Sherri Shade

Much prior research has examined the dearth of women in the IT industry. The purpose of this study is to examine the perceptions of women in IT within the context of information security and assurance. This paper describes results from a study of a relatively new career path to see if there are female-friendly opportunities that have not existed in previous IT career paths. Research methodology focuses on a qualitative analysis of in-depth interviews with women who are self-described information security professionals. A primary goal of the study is to understand the perceptions of women in information security and determine …


Architectural Control And Value Migration In Layered Ecosystems: The Case Of Open-Source Cloud Management Platforms, Richard Tee, C. Jason Woodard Jun 2014

Architectural Control And Value Migration In Layered Ecosystems: The Case Of Open-Source Cloud Management Platforms, Richard Tee, C. Jason Woodard

C. Jason Woodard

Our paper focuses on strategic decision making in layered business ecosystems, highlighting the role of cross-layer interactions in shaping choices about product design and platform governance. Based on evidence from the cloud computing ecosystem, we analyze how concerns about architectural control and expectations regarding future value migration influence the design of product interfaces and the degree of openness to external contributions. We draw on qualitative longitudinal data to trace the development of two open-source platforms for managing cloud-based computing resources. We focus in particular on the emergence of a layered "stack" in which these platforms must compete with both vertically …


Cugar: A Model For Open Innovation In Science And Technology Parks, Arcot Desai Narasimhalu Jun 2014

Cugar: A Model For Open Innovation In Science And Technology Parks, Arcot Desai Narasimhalu

Arcot Desai NARASIMHALU

This paper reviews key elements of a Science or Technology Park in the context of open innovation. Insights into and recommendations on key issues related to intellectual property, licensing and venture capital that would be of interest to any Science Park are presented later.


Innovating Services In Science And Technology Parks, Arcot Desai Narasimhalu Jun 2014

Innovating Services In Science And Technology Parks, Arcot Desai Narasimhalu

Arcot Desai NARASIMHALU

Science and Technology Parks are in the business of providing services to their tenants, a mix of large companies, Small and Medium Enterprises and startups. The service needs of each of these types of companies will be different. The quality of services can be improved by understanding the needs of the tenants both, prior to building the Science and Technology Parks as well as on an ongoing basis. This paper introduces the CUGAR model for Science and Technology Parks as well as Service Innovation Design framework. It then proceeds to discuss how the Service Innovation framework could be applied to …


A Tool For Designing Business Model Innovations, Arcot Desai Narasimhalu Jun 2014

A Tool For Designing Business Model Innovations, Arcot Desai Narasimhalu

Arcot Desai NARASIMHALU

There is a steady stream of business model innovations created to deliver value to customers using new approaches. Famous examples of business model innovations have been Amazon, Dell computers and Starbucks. Several other examples of business model innovations have been created across industries and reported in popular and academic forums. Osterwalder and Pigneur had defined a business model canvas as a framework for analysing business models. They had defined nine key subcomponents of a business model. Companies and individual entrepreneurs who wish to create business model innovations are still deploying trial and error approaches to discovering new business models. There …


Designing Optimal Innovation Portfolio, Arcot Desai Narasimhalu Jun 2014

Designing Optimal Innovation Portfolio, Arcot Desai Narasimhalu

Arcot Desai NARASIMHALU

There have been many approaches towards investing in innovation projects. There has been very little discussion about the need to align such investments with the mission, vision, goals, leadership style, value discipline and risk appetite of an organization. This paper reviews existing approaches to innovation related investments and suggests the setting up of a proper innovation portfolio management process along with three dashboards that will help make innovation related investment decisions in an informed manner. The resulting innovation portfolio will be optimal in its alignment with an organizations mission and vision. We expect this method to be used by all …