Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences

2012

Institution
Keyword
Publication
Publication Type
File Type

Articles 31 - 60 of 144

Full-Text Articles in Business

Principles For Conducting Critical Realist Case Study Research In Information Systems, Donald E. Wynn, Clay K. Williams Sep 2012

Principles For Conducting Critical Realist Case Study Research In Information Systems, Donald E. Wynn, Clay K. Williams

MIS/OM/DS Faculty Publications

Critical realism is emerging as a viable philosophical paradigm for conducting social science research, and has been proposed as an alternative to the more prevalent paradigms of positivism and interpretivism. Few papers, however, have offered clear guidance for applying this philosophy to actual research methodologies. Under critical realism, a causal explanation for a given phenomenon is inferred by explicitly identifying the means by which structural entities and contextual conditions interact to generate a given set of events. Consistent with this view of causality, we propose a set of methodological principles for conducting and evaluating critical realism-based explanatory case study research …


Guest Editors’ Introduction: Poverty, Technology, Microfinance And Development, Robert J. Kauffman, Frederick J. Riggins Sep 2012

Guest Editors’ Introduction: Poverty, Technology, Microfinance And Development, Robert J. Kauffman, Frederick J. Riggins

Research Collection School Of Computing and Information Systems

A consistent expectation on the part of public policy-makers, governments and non-governmental organizations (NGOs) has been that information and communications technologies (ICTs) will be a driver of economic growth and social development for the people away from poverty in the nations that harness them effectively. As this process proceeds around the world in the presence of dramatic technical progress, poverty nevertheless continues to be a difficult and grinding social problem to combat. In spite of the promised changes, the reality is that today there are greater population pressures, continuing inertial forces for economic stagnation, unstable social conditions and regional strife, …


A Computational Analysis Of Bundle Trading Markets Design For Distributed Resource Allocation, Zhiling Guo, Gary J. Koehler, Andrew B. Whinston Sep 2012

A Computational Analysis Of Bundle Trading Markets Design For Distributed Resource Allocation, Zhiling Guo, Gary J. Koehler, Andrew B. Whinston

Research Collection School Of Computing and Information Systems

Online auction markets play increasingly important roles for resource allocations in distributed systems. This paper builds upon a market-based framework presented by Guo et al. (Guo, Z., G. J. Koehler, A. B. Whinston. 2007. A market-based optimization algorithm for distributed systems. Management Sci. 53(8) 1345–1458), where a distributed system optimization problem is solved by self-interested agents iteratively trading bundled resources in a double auction market run by a dealer. We extend this approach to a dynamic, asynchronous Internet market environment and investigate how various market design factors including dealer inventory policies, market communication patterns, and agent learning strategies affect the …


Editorial: Social Implications Of Technology- “Il Buono, Il Brutto, Il Cattivo”, Katina Michael Aug 2012

Editorial: Social Implications Of Technology- “Il Buono, Il Brutto, Il Cattivo”, Katina Michael

Professor Katina Michael

Late last year, IEEE SSIT was invited to put together a paper for the centennial edition of Proceedings of the IEEE that was published in May 2012. The paper titled, “Social Implications of Technology: The Past, the Present, and the Future,” brought together five members of SSIT with varying backgrounds, and two intense months of collaboration and exchange of ideas. I personally felt privileged to be working with Karl D. Stephan, Emily Anesta, Laura Jacobs and M.G. Michael on this project.


Book Review: Handbook On Securing Cyber-Physical Critical Infrastructure: Foundations And Challenges (Written By Sajal K. Das, Krishna Kant, Nan Zhang), Katina Michael Aug 2012

Book Review: Handbook On Securing Cyber-Physical Critical Infrastructure: Foundations And Challenges (Written By Sajal K. Das, Krishna Kant, Nan Zhang), Katina Michael

Professor Katina Michael

This 800+ page handbook is divided into eight parts and contains thirty chapters, ideal for either an advanced undergraduate or graduate course in security. At the heart of this handbook is how we might go about managing both physical and cyber infrastructures, as they continue to become embedded and enmeshed, through advanced control systems, and new computing and communications paradigms.


The Return Of Dr. Strangelove, Jan Kallberg, Adam Lowther Aug 2012

The Return Of Dr. Strangelove, Jan Kallberg, Adam Lowther

Jan Kallberg

With the prospect of sequestration looming, the United States may find itself increasingly rely ing on nuclear and cy ber deterrence as an affordable means of guaranteeing national sovereignty and preventing major conflict between the U.S. and potential adversaries in the Asia-Pacific. While earlier defense planning and acquisition were based on economic conditions that no longer ex ist, Congress’s options to balance the budget by cutting defense spending are politically palatable because far fewer American are “defense v oters” relative to “social welfare voters,” according to a number of recent public opinion surveys. The simple fact is China’s rise has …


A Survey Of Schema Matching Research, Roger Blake Aug 2012

A Survey Of Schema Matching Research, Roger Blake

Roger H. Blake

Schema matching is the process of developing semantic matches between two or more schemas. The purpose of schema matching is generally either to merge two or more databases, or to enable queries on multiple, heterogeneous databases to be formulated on a single schema (Doan and Halevy 2005). This paper develops a taxonomy of schema matching approaches, classifying them as being based on a combination schema matching technique and the type of data used by those techniques. Schema matching techniques are categorized as being based on rules, learning, or ontology, and the type of data used is categorized as being based …


Bailey/Howe Reference Analytics: What Two Years Of Data Tell Us, Elizabeth Berman Aug 2012

Bailey/Howe Reference Analytics: What Two Years Of Data Tell Us, Elizabeth Berman

UVM Libraries Conference Day

Analyzing the last two academic years (2010-2011 and 2011-2012) of reference-desk statistics, this presentation will highlight trends at the Bailey/Howe Reference Desk, and offer scenarios for the future of reference services.


Niche-Seeking In Influence Maximization With Adversary, Long Foong Liow, Shih-Fen Cheng, Hoong Chuin Lau Aug 2012

Niche-Seeking In Influence Maximization With Adversary, Long Foong Liow, Shih-Fen Cheng, Hoong Chuin Lau

Research Collection School Of Computing and Information Systems

In hotly contested product categories dominated by a few powerful firms, it is quite common for weaker or late entrants to focus only on particular segments of the whole market. The rationale for such strategy is intuitive: to avoid direct confrontation with heavy-weight firms, and to concentrate in segments where these weaker firms have comparative advantages. In marketing, this is what people called “go niche or go home". The niche-building strategy may rely on “homophily", which implies that consumers in a particular market segment might possess certain set of attributes that cause them to appreciate certain products better (in other …


The Pricing Model Of Cloud Computing Services, Jianhui Huang, Dan Ma Aug 2012

The Pricing Model Of Cloud Computing Services, Jianhui Huang, Dan Ma

Research Collection School Of Computing and Information Systems

Cloud computing service providers offer computing resource as a utility and software as a service over network. Many believe that Cloud computing is making an industry-wise paradigm shift for IT use. Besides its technique issues, the business feature of Cloud computing attracts our interests. Specifically the practice of Amazon EC2 introduces an interesting pricing scheme. Amazon provides users with virtual computing instances as a combination of interruptible service (i.e., spot instance) and uninterruptible service (i.e., on-demand and reserved instance). Spot instance is charged at a per use price which is dynamically changing over time; users of spot instance face the …


Bidder Behaviors In Repeated B2b Procurement Auctions, Jong Han Park, Jae Kyu Lee, Hoong Chuin Lau Aug 2012

Bidder Behaviors In Repeated B2b Procurement Auctions, Jong Han Park, Jae Kyu Lee, Hoong Chuin Lau

Research Collection School Of Computing and Information Systems

B2B auctions play a key role in a firm's procurement process. Even though it is known that repetition is a key characteristic of procurement auctions, traditional auctioneers typically have not put in place a suitable mechanism that supports repetitive auctions effectively. In this paper, we empirically investigate what has taken place in repeated procurement auctions based on real world data from a major outsourcing company of MRO (Maintenance, Repair and Operations) items in Korea. From this empirical study, we discovered the followings. First, we discovered that the repeated bidders contribute majority of all bids, and that the number of new …


Investment Timing For Mobile Payment Systems, Robert J. Kauffman, Jun Liu, Dan Ma Aug 2012

Investment Timing For Mobile Payment Systems, Robert J. Kauffman, Jun Liu, Dan Ma

Research Collection School Of Computing and Information Systems

The recent launch of Google Wallet has brought the issue of technology solutions in the mobile payment (m-payment) area to the forefront. In deciding whether and when to adopt m-payment technology, senior managers in banks are naturally concerned about uncertainties regarding future market conditions, technology standards, and consumer and merchant responses, especially their willingness to adopt. This study applies economic theory and modeling for decision-making under uncertainty to bank investments in mobile payment technology. We assess the projected benefits and costs of investment as a continuous-time stochastic process to determine optimal investment timing. We find that the value of waiting …


From Clickstreams To Searchstreams: Search Network Graph Evidence From A B2b E-Market, Mei Lin, M. F. Lin, Robert J. Kauffman Aug 2012

From Clickstreams To Searchstreams: Search Network Graph Evidence From A B2b E-Market, Mei Lin, M. F. Lin, Robert J. Kauffman

Research Collection School Of Computing and Information Systems

Consumers in e-commerce acquire information through search engines, yet to date there has been little empirical study on how users interact with the results produced by search engines. This is analogous to, but different from, the ever-expanding research on clickstreams, where users interact with static web pages. We propose a new network approach to analyzing search engine server log data. We call this searchstream data. We create graph representations based on the web pages that users traverse as they explore the search results that their use of search engines generates. We then analyze the graph-level properties of these search network …


Hedonic Valuation Of Online Game Participation, Robert J. Kauffman, Kwansoo Kim, Byungjoon Yoo Aug 2012

Hedonic Valuation Of Online Game Participation, Robert J. Kauffman, Kwansoo Kim, Byungjoon Yoo

Research Collection School Of Computing and Information Systems

We use hedonic valuation to establish a basis for valuing the time a user participates in an online gaming community. We distinguish between utilitarian and hedonic value. Our application involves elements of both utilitarian and hedonic value, however, the latter is much more important. We use an extensive data set involving a massive multi-player online role-playing game (MMORPG) from Korea. We specify and test econometric models that reflect the appropriate empirical structure for the setting, based on information about the players and the activities they engage in. The results permit us to estimate the hedonic value in monetary terms for …


Valuation Of Benchmark Provisions On It Services Contracts, Robert J. Kauffman, Ryan Sougstad Aug 2012

Valuation Of Benchmark Provisions On It Services Contracts, Robert J. Kauffman, Ryan Sougstad

Research Collection School Of Computing and Information Systems

Information technology (IT) services are often subject to downward price pressures due to improvements in technology and business processes in a competitive market. When clients enter into IT services contracts, they are faced with the future risk that their services will be overpriced relative to the broader IT services market. To mitigate this risk, clients often add benchmark provisions, whereby a neutral third party assesses the prevailing market price for services. It will support fair price adjustments if the market prices are lower than the current prices. We model the decision to benchmark in order to provide managerial information on …


Consumer Micro-Behavior And Tv Viewership Patterns: Data Analytics For The Two-Way Set-Top Box, Ray M. Chang, Robert J. Kauffman, Insoo Son Aug 2012

Consumer Micro-Behavior And Tv Viewership Patterns: Data Analytics For The Two-Way Set-Top Box, Ray M. Chang, Robert J. Kauffman, Insoo Son

Research Collection School Of Computing and Information Systems

Consumer behavior patterns related to home digital media use are changing due to technological innovations. We examine them in the presence of two-way cable television (CATV) settop boxes. They permit viewers to change channels, switch to the Internet, and order paid programming, among other functions. We focus on micro-level data that are generated from consumer CATV viewing behavior. We capture clickstreams of channel-changing behavior when consumer use a remote control handset to interact with the set-top box in their home. We explore a variety of data analytics results that characterize patterns of consumer channel-switching behavior, as a basis for suggesting …


Message From General Chair And Program Co-Chairs [Of Icec '12, 14th Annual International Conference On Electronic Commerce, Held In Singapore, 7-8 August 2012], Robert J. Kauffman, Martin Bichler, Hoong Chuin Lau, Christopher Yang, Yinping Yang Aug 2012

Message From General Chair And Program Co-Chairs [Of Icec '12, 14th Annual International Conference On Electronic Commerce, Held In Singapore, 7-8 August 2012], Robert J. Kauffman, Martin Bichler, Hoong Chuin Lau, Christopher Yang, Yinping Yang

Research Collection School Of Computing and Information Systems

Singapore, a major hub in the Asia Pacific region well known for its multi-racial and multicultural society, is proud to host the 14th International Conference on Electronic Commerce. Singapore Management University (SMU), the School of Information Systems (SIS) and the Living Analytics Research Center (LARC) are also delighted to be able to support the delivery of this event.


Common Criteria Meets Realpolitik Trust, Alliances, And Potential Betrayal, Jan Kallberg Jul 2012

Common Criteria Meets Realpolitik Trust, Alliances, And Potential Betrayal, Jan Kallberg

Jan Kallberg

Common Criteria for Information Technology Security Evaluation has the ambition to be a global standard for IT-security certification. The issued certifications are mutually recognized between the signatories of the Common Criteria Recognition Arrangement. The key element in any form of mutual relationships is trust. A question raised in this paper is how far trust can be maintained in Common Criteria when additional signatories enter with conflicting geopolitical interests to earlier signatories. Other issues raised are control over production, the lack of permanent organization in the Common Criteria, which leads to concerns of being able to oversee the actual compliance. As …


Heuristic Algorithms For Balanced Multi-Way Number Partitioning, Jilian Zhang, Kyriakos Mouratidis, Hwee Hwa Pang Jul 2012

Heuristic Algorithms For Balanced Multi-Way Number Partitioning, Jilian Zhang, Kyriakos Mouratidis, Hwee Hwa Pang

Kyriakos MOURATIDIS

Balanced multi-way number partitioning (BMNP) seeks to split a collection of numbers into subsets with (roughly) the same cardinality and subset sum. The problem is NP-hard, and there are several exact and approximate algorithms for it. However, existing exact algorithms solve only the simpler, balanced two-way number partitioning variant, whereas the most effective approximate algorithm, BLDM, may produce widely varying subset sums. In this paper, we introduce the LRM algorithm that lowers the expected spread in subset sums to one third that of BLDM for uniformly distributed numbers and odd subset cardinalities. We also propose Meld, a novel strategy for …


Innovation Rules: A Step By Step Approach Towards Identifying New Innovation Opportunities, Arcot Desai Narasimhalu Jul 2012

Innovation Rules: A Step By Step Approach Towards Identifying New Innovation Opportunities, Arcot Desai Narasimhalu

Arcot Desai NARASIMHALU

No abstract provided.


A Quality Metric For Sustainable Innovations, Arcot Desai Narasimhalu Jul 2012

A Quality Metric For Sustainable Innovations, Arcot Desai Narasimhalu

Arcot Desai NARASIMHALU

Sustainability has become a major concern for nations and firms especially since the Kyoto Protocol was defined in 1997. While there have been several studies on benchmarks for national innovation systems and effectiveness of innovation management within firms there is as yet no reasonable metric for determining the quality of an innovation much less its quality relating to sustainability? Similarly, there have been several studies on sustainability but that such research groups have also not focused on developing a metric for denoting the quality of sustainable innovations. This paper offers a metric that defines the quality of an innovation, especially …


Agile Innovation Management, Arcot Desai Narasimhalu Jul 2012

Agile Innovation Management, Arcot Desai Narasimhalu

Arcot Desai NARASIMHALU

The volume and velocity of innovations are on the increase resulting in increased pressures on every company for attaining, retaining and increasing its market leadership. Many companies need to retool their innovation management processes to address two agility related objectives in order to survive and grow in such a rapidly changing innovation environment. The first objective would be the ability to assemble an innovation team within the shortest possible time. This can only be satisfied by companies that are capable of forming innovation teams rather quickly. The related second objective would be to reduce the I2M (Idea to Market) cycle …


International Ict Research Collaboration: Experiences And Recommendations, Erich Prem, Emma Barron, Arcot Desai Narasimhalu, Ian Morgan Jul 2012

International Ict Research Collaboration: Experiences And Recommendations, Erich Prem, Emma Barron, Arcot Desai Narasimhalu, Ian Morgan

Arcot Desai NARASIMHALU

This paper presents results of a study into the collaboration experiences of researchers. The focus is on long-distance collaboration in information and communication technologies (ICT) research and technology development, i.e. between the EU on the one side and Australia, Singapore or New Zealand on the other. The aim of the study was to provide useful recommendations for researchers who engage in international collaboration and to improve the quality of international co-operation projects. The emphasis here is on the views and experiences of Europe"s international partners. The paper analysis collaboration motives, challenges, co-operation types and provides recommendations for project initiation, networking, …


Managing Successful Innovation Delivery, Arcot Desai Narasimhalu Jul 2012

Managing Successful Innovation Delivery, Arcot Desai Narasimhalu

Arcot Desai NARASIMHALU

No abstract provided.


Strategies For European Ict Rtd Collaboration With Australia And Singapore, Arcot Desai Narasimhalu, Narayanasamy Ramasubbu, Alex, Tai Loong Tan, Eric Prem, Ian Morgan, Ashley Stewart, Emma Baron, Dana Sanchez Jul 2012

Strategies For European Ict Rtd Collaboration With Australia And Singapore, Arcot Desai Narasimhalu, Narayanasamy Ramasubbu, Alex, Tai Loong Tan, Eric Prem, Ian Morgan, Ashley Stewart, Emma Baron, Dana Sanchez

Arcot Desai NARASIMHALU

No abstract provided.


Innovative Entrepreneurs Workbook, Arcot Desai Narasimhalu Jul 2012

Innovative Entrepreneurs Workbook, Arcot Desai Narasimhalu

Arcot Desai NARASIMHALU

The workbook provides a step by step approach to identifying innovation opportunities and the key aspects of Innovation development


The Value Of Government Mandated Location-Based Services In Emergencies In Australia, Anas Aloudat, Katina Michael, Roba Abbas, Mutaz Al-Debei Jul 2012

The Value Of Government Mandated Location-Based Services In Emergencies In Australia, Anas Aloudat, Katina Michael, Roba Abbas, Mutaz Al-Debei

Associate Professor Katina Michael

The adoption of mobile technologies for emergency management has the capacity to save lives. In Australia in February 2009, the Victorian Bushfires claimed 173 lives, the worst peace-time disaster in the nation’s history. The Australian government responded swiftly to the tragedy by going to tender for mobile applications that could be used during emergencies, such as mobile alerts and location services. These applications, which are becoming increasingly accurate with the evolution of positioning techniques, have the ability to deliver personalized information direct to the citizen during crises, complementing traditional broadcasting mediums like television and radio. Indeed governments have a responsibility …


Decision Support For Agent Populations In Uncertain And Congested Environments, Pradeep Reddy Varakantham, Shih-Fen Cheng, Geoff Gordon, Asrar Ahmed Jul 2012

Decision Support For Agent Populations In Uncertain And Congested Environments, Pradeep Reddy Varakantham, Shih-Fen Cheng, Geoff Gordon, Asrar Ahmed

Research Collection School Of Computing and Information Systems

This research is motivated by large scale problems in urban transportation and labor mobility where there is congestion for resources and uncertainty in movement. In such domains, even though the individual agents do not have an identity of their own and do not explicitly interact with other agents, they effect other agents. While there has been much research in handling such implicit effects, it has primarily assumed deterministic movements of agents. We address the issue of decision support for individual agents that are identical and have involuntary movements in dynamic environments. For instance, in a taxi fleet serving a city, …


On-Line Portfolio Selection With Moving Average Reversion, Bin Li, Steven C. H. Hoi Jul 2012

On-Line Portfolio Selection With Moving Average Reversion, Bin Li, Steven C. H. Hoi

Research Collection School Of Computing and Information Systems

On-line portfolio selection has attracted increasing interests in machine learning and AI communities recently. Empirical evidences show that stock's high and low prices are temporary and stock price relatives are likely to follow the mean reversion phenomenon. While the existing mean reversion strategies are shown to achieve good empirical performance on many real datasets, they often make the single-period mean reversion assumption, which is not always satisfied in some real datasets, leading to poor performance when the assumption does not hold. To overcome the limitation, this article proposes a multiple-period mean reversion, or so-called Moving Average Reversion (MAR), and a …


Mydeal: The Context-Aware Urban Shopping Assistant, Kartik Muralidharan, Swapna Gottipati, Jing Jiang, Narayan Ramasubbu, Rajesh Krishna Balan Jul 2012

Mydeal: The Context-Aware Urban Shopping Assistant, Kartik Muralidharan, Swapna Gottipati, Jing Jiang, Narayan Ramasubbu, Rajesh Krishna Balan

Research Collection School Of Computing and Information Systems

A common problem in large Urban cities, of the sort seen in Asia, is the huge number of retail options available in the city. In particular, it is not uncommon to find multiple malls, each with hundreds of stores inside, just a short distance from each other in almost every part of these cities. These factors make it incredibly hard for consumers to identify stores of interest to them in any particular mall.In response, a number of shopping assistance applications have been created for mobile phones.However, these applications mostly just allow users to know which stores are where or to …