Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences

2014

Institution
Keyword
Publication
Publication Type
File Type

Articles 1 - 30 of 95

Full-Text Articles in Business

Drip - Data Rich, Information Poor: A Concise Synopsis Of Data Mining, Muhammad Obeidat, Max North, Lloyd Burgess, Sarah North Dec 2014

Drip - Data Rich, Information Poor: A Concise Synopsis Of Data Mining, Muhammad Obeidat, Max North, Lloyd Burgess, Sarah North

Faculty and Research Publications

As production of data is exponentially growing with a drastically lower cost, the importance of data mining required to extract and discover valuable information is becoming more paramount. To be functional in any business or industry, data must be capable of supporting sound decision-making and plausible prediction. The purpose of this paper is concisely but broadly to provide a synopsis of the technology and theory of data mining, providing an enhanced comprehension of the methods by which massive data can be transferred into meaningful information.


Three Essays On Opinion Mining Of Social Media Texts, Shuyuan Deng Dec 2014

Three Essays On Opinion Mining Of Social Media Texts, Shuyuan Deng

Theses and Dissertations

This dissertation research is a collection of three essays on opinion mining of social media texts. I explore different theoretical and methodological perspectives in this inquiry. The first essay focuses on improving lexicon-based sentiment classification. I propose a method to automatically generate a sentiment lexicon that incorporates knowledge from both the language domain and the content domain. This method learns word associations from a large unannotated corpus. These associations are used to identify new sentiment words. Using a Twitter data set containing 743,069 tweets related to the stock market, I show that the sentiment lexicons generated using the proposed method …


Platform Pricing With Endogenous Network Effects, Mei Lin, Ruhai Wu, Wen Zhou Dec 2014

Platform Pricing With Endogenous Network Effects, Mei Lin, Ruhai Wu, Wen Zhou

Research Collection School Of Computing and Information Systems

This paper examines a monopoly platform’s two-sided pricing strategy through modeling the trades between the participating sellers and buyers. In this approach, the network effects emerge endogenously through the equilibrium trading strategies of the two sides. We show that platform pricing depends crucially on the characteristics associated with market liquidity, including both sides’ entry costs, the buyers’ preferences, and the distribution of the sellers’ quality. The platform may subsidize sellers if the market is sufficiently liquid, whereas buyer subsidy can be optimal given an illiquid market. We also illustrate the impact of the sellers’ quality heterogeneity on the platform’s optimal …


Orchestrating Service Innovation Using Design Moves: The Dynamics Of Fit Between Service And Enterprise It Architectures, Narayan Ramasubbu, Charles Jason Woodard, Sunil Mithas Dec 2014

Orchestrating Service Innovation Using Design Moves: The Dynamics Of Fit Between Service And Enterprise It Architectures, Narayan Ramasubbu, Charles Jason Woodard, Sunil Mithas

Research Collection School Of Computing and Information Systems

Service science perspectives highlight the central role of information technology (IT) in transforming the design and delivery of services. To discern the mechanisms through which IT impacts service innovation, we explore the dynamics of the relationship between enterprise IT and service architectures, and how these dynamics influence the performance of service innovation projects. We conducted six case studies to investigate how firms orchestrated service innovation, focusing on the design of the service architecture and its relationship to enterprise systems. We synthesize the case findings to develop a set of propositions on the antecedents and consequences of fit (or misfit) between …


A Metrics Suite Of Cloud Computing Adoption Readiness, Robert J. Kauffman, Dan Ma, Martin Yu Dec 2014

A Metrics Suite Of Cloud Computing Adoption Readiness, Robert J. Kauffman, Dan Ma, Martin Yu

Research Collection School Of Computing and Information Systems

Recent research on cloud computing adoption indicates that there has been a lack of deep understanding of its benefits by managers and organizations. This has been an obstacle for adoption. We report on an initial design for a firm-level cloud computing readiness metrics suite. We propose categories and measures to form a set of metrics to measure adoption readiness and assess the required adjustments in strategy and management, technology and operations, and business policies. We reviewed the relevant interdisciplinary literature and interviewed industry professionals to ground our metrics based on theory and practice knowledge. We identified four relevant categories for …


Mydeal: A Mobile Shopping Assistant Matching User Preferences To Promotions, Kartik Muralidharan, Swapna Gottipati, Jing Jiang, Narayan Ramasubbu, Rajesh Krishna Balan Dec 2014

Mydeal: A Mobile Shopping Assistant Matching User Preferences To Promotions, Kartik Muralidharan, Swapna Gottipati, Jing Jiang, Narayan Ramasubbu, Rajesh Krishna Balan

Research Collection School Of Computing and Information Systems

A common problem in large urban cities is the huge number of retail options available. In response, a number of shopping assistance applications have been created for mobile phones. However, these applications mostly allow users to know where stores are or find promotions on specific items. What is missing is a system that factors in a user's shopping preferences and automatically tells them which stores are of their interest. The key challenge in this system is twofold; 1) building a matching algorithm that can combine user preferences with fairly unstructured deals and store information to generate a final rank ordered …


Using Consumer Informedness As An Information Strategy, Ting Li, Robert John Kauffman, Eric Van Heck, Peter Vervest, Benedict Dellaert Dec 2014

Using Consumer Informedness As An Information Strategy, Ting Li, Robert John Kauffman, Eric Van Heck, Peter Vervest, Benedict Dellaert

Research Collection School Of Computing and Information Systems

Consumer informedness describes the degree to which consumers are aware of the specific attributes of products or services offered in the marketplace. Understanding how this level of informedness can amplify consumer behaviour provides firms with the opportunity to develop information-based strategies that can encourage their target segment make purchases.


Modeling The Evolution Of Generativity And The Emergence Of Digital Ecosystems, C. Jason Woodard, Eric K. Clemons Dec 2014

Modeling The Evolution Of Generativity And The Emergence Of Digital Ecosystems, C. Jason Woodard, Eric K. Clemons

Research Collection School Of Computing and Information Systems

Recent literature on sociotechnical systems has employed the concept of generativity to explain the remarkable capacity for digital artifacts to support decentralized innovation and the emergence of rich business ecosystems. In this paper, we propose agent-based computational modeling as a tool for studying the evolution of generativity, and offer a set of building blocks for constructing agent-based models in which generativity evolves. We describe a series of models that we have created using these building blocks, and summarize the results of our computational experiments to date. We find in several different settings that key features of generative systems can themselves …


In Service For Sharing: Leadership And Leader - Follower Relationship Factors As Influencers Of Tacit Knowledge Sharing In The It Industry, Billy Whisnant, Odai Khasawneh Nov 2014

In Service For Sharing: Leadership And Leader - Follower Relationship Factors As Influencers Of Tacit Knowledge Sharing In The It Industry, Billy Whisnant, Odai Khasawneh

Odai Khasawneh

Tacit knowledge is an organizational resource that is difficult to cultivate. It requires that responsible agents in the organization take an active role in encouraging trust and the development of relationships where individuals feel that their voice will be heard and that there will be a benefit from them passing knowledge onto someone else. In knowledge work tacit knowledge is especially important. 

This research found that servant leadership is an important factor in influencing tacit knowledge sharing, however leader-member exchange is a factor that will strongly support the sharing of tacit knowledge. 

If there is a dearth in servant leadership, …


Managing Seller Heterogeneity In A Competitive Marketplace, R. Wu, Mei Lin Nov 2014

Managing Seller Heterogeneity In A Competitive Marketplace, R. Wu, Mei Lin

Research Collection School Of Computing and Information Systems

The growth of online marketplaces is accompanied by significant heterogeneity of the third-party sellers. The marketplace owner often applies policies that favor the sellers who offer higher values to buyers, which puts the lower-value sellers at an even greater disadvantage. This leads to the phenomenon of Matthew Effect. Our study focuses on a marketplace owner’s policy in managing seller heterogeneity and analyzes Matthew Effect in a competitive market environment. By extending the circular city model, we analytically examine the price competition among a large number of sellers that differ both in variety and in their value offerings. We present the …


An Ecological Model For Digital Platforms Maintenance And Evolution, Paolo Rocchi, Paolo Spagnoletti, Subhajit Datta Nov 2014

An Ecological Model For Digital Platforms Maintenance And Evolution, Paolo Rocchi, Paolo Spagnoletti, Subhajit Datta

Research Collection School Of Computing and Information Systems

The maintenance of software products has been studied extensively in both software engineering and management information systems. Such studies are mainly focused on the activities that take place prior to starting the maintenance phase. Their contribution is either related to the improvement of software quality or to validating contingency models for reducing maintenance efforts. The continuous maintenance philosophy suggests to shift the attention within the maintenance phase for better coping with the evolutionary trajectories of digital platforms. In this paper, we examine the maintenance process of a digital platform from the perspective of the software vendor. Based on our empirical …


Strategic Sourcing In The Presence Of Uncertain Supply And Retail Competition, Jianqing Chen, Zhiling Guo Oct 2014

Strategic Sourcing In The Presence Of Uncertain Supply And Retail Competition, Jianqing Chen, Zhiling Guo

Research Collection School Of Computing and Information Systems

This paper develops an analytical model to evaluate competing retail firms’ sourcing strategies in the presence of supply uncertainty. We consider a common supplier that sells its uncertain supply to two downstream retail firms engaging in price competition in a horizontally differentiated product market. The focal firm has a dual-sourcing option, while the rival firm can only source from the common supplier. We assess the system-wide effects of supply uncertainty on the focal firm's incentive to pursue the dual-sourcing strategy. We find that the focal firm's dual-sourcing strategy can create a win-win situation that leads to increased retail prices and …


Auction With Rolling Horizon For Urban Consolidation Centre, Chen Wang, Stephanus Daniel Handoko, Hoong Chuin Lau Oct 2014

Auction With Rolling Horizon For Urban Consolidation Centre, Chen Wang, Stephanus Daniel Handoko, Hoong Chuin Lau

Research Collection School Of Computing and Information Systems

A number of cities around the world have adopted urban consolidation centres (UCCs) to address some challenges of their last-mile deliveries. At the UCC, goods are consolidated based on their destinations prior to their deliveries into the city centre. In many examples, the UCC owns a fleet of eco-friendly vehicles to carry out the deliveries. A carrier/shipper who buys the UCC’s service hence no longer needs to enter the city centre in which time-window and vehicle-type restrictions may apply. As a result, it becomes possible to retain the use of large trucks for the economies of scale outside the city …


An Investigation Of The Key Factors That Affect The Adoption Of Smartphones In Global Midmarket Professional Service Firms, Mark S. Kocour Sep 2014

An Investigation Of The Key Factors That Affect The Adoption Of Smartphones In Global Midmarket Professional Service Firms, Mark S. Kocour

CCE Theses and Dissertations

The evolution and proliferation of mobile devices (m-devices) in the workplace have been rapid. In comparison to conventional services provided by mobile phones (m-phones), smartphones feature sophisticated functionality, such as Internet access, video/audio streaming, and business productivity applications. As a consequence of increased demand for smartphones in the workplace, an understanding of the factors that determine the decision to adopt smartphones in business settings is necessary. The goal of this investigation was to identify the key factors that have an impact on the adoption of smartphones.

This dissertation investigation provided an understanding of the key factors that affect the adoption …


Corporate Security: Using Knowledge Construction To Define A Practising Body Of Knowledge, David Brooks Sep 2014

Corporate Security: Using Knowledge Construction To Define A Practising Body Of Knowledge, David Brooks

David J Brooks Dr.

Security is a multidimensional concept, with many meanings, practising domains, and heterogeneous occupations. Therefore, it is difficult to define security as a singular concept, although understanding may be achieved by its applied context in presenting a domicile body of knowledge. There have been studies that have presented a number of corporate security bodies of knowledge; however, there is still restricted consensus. From these past body of knowledge studies, and supported by multidimensional scaling knowledge mapping, a body of knowledge framework is put forward, integrating core and allied knowledge categories. The core knowledge categories include practise areas such as risk management, …


Capacity Planning With Financial And Operational Hedging In Low‐Cost Countries, Lijian Chen, Shanling Li, Letian Wang Sep 2014

Capacity Planning With Financial And Operational Hedging In Low‐Cost Countries, Lijian Chen, Shanling Li, Letian Wang

MIS/OM/DS Faculty Publications

The authors of this paper outline a capacity planning problem in which a risk-averse firm reserves capacities with potential suppliers that are located in multiple low-cost countries. While demand is uncertain, the firm also faces multi-country foreign currency exposures. This study develops a mean-variance model that maximizes the firm’s optimal utility and derives optimal utility and optimal decisions in capacity and financial hedging size. The authors show that when demand and exchange rate risks are perfectly correlated, a risk- averse firm, by using financial hedging, will achieve the same optimal utility as a risk-neutral firm. In this paper as well, …


Trust, Betrayal, And Whistle-Blowing: Reflections On The Edward Snowden Case, Herman T. Tavani, Frances Grodzinsky Sep 2014

Trust, Betrayal, And Whistle-Blowing: Reflections On The Edward Snowden Case, Herman T. Tavani, Frances Grodzinsky

School of Computer Science & Engineering Faculty Publications

Is every act of whistle blowing, by definition, a betrayal of trust on the part of the whistle-blower? If so, are employees who blow the whistle, by implication, untrustworthy employees? Assuming that they are, would employees who blow the whistle (presumably on the grounds of moral obligation) also be willing to concede that they are not trustworthy employees, by virtue of carrying out their whistle-blowing act(s)? In answering these questions, we first propose some working definitions of whistle-blowing, trust, and trustworthiness. We then ask whether some instances of whistle-blowing are morally permissible (and perhaps also morally required), even if it …


Exploring Variety Seeking Behavior In Mobile Users, Kasthuri Jayarajah, Robert J. Kauffman, Archan Misra Sep 2014

Exploring Variety Seeking Behavior In Mobile Users, Kasthuri Jayarajah, Robert J. Kauffman, Archan Misra

Research Collection School Of Computing and Information Systems

Understanding the personality traits and current attitudes of individual consumers is crucial for retailers and mobile advertisers. In this paper, we investigate the phenomenon of “variety seeking tendencies" in mobile users in their (1) online (represented by their App usage behavior), and (2) physical (represented by their location visits) worlds. We show that different categories of users exhibit different levels of variety. Further, by analyzing at various time scales, we show that there exists correlation between when a person is likely to visit new places in the real world and when he/she is likely to explore new Apps in the …


Intent-Based User Segmentation With Query Enhancement, Wei Xiong Aug 2014

Intent-Based User Segmentation With Query Enhancement, Wei Xiong

Dissertations

With the rapid advancement of the internet, accurate prediction of user's online intent underlying their search queries has received increasing attention from the online advertising community. As a rich source of information on web user's behavior, query logs have been leveraged by advertising companies to deliver personalized advertisements. However, a typical query usually contains very few terms, which only carry a small amount of information about a user's interest. The tendency of users to use short and ambiguous queries makes it difficult to fully describe and distinguish a user's intent. In addition, the query feature space is sparse, as only …


The Learning Curves In Open-Source Software (Oss) Development Network, Youngsoo Kim, Lingxiao Jiang Aug 2014

The Learning Curves In Open-Source Software (Oss) Development Network, Youngsoo Kim, Lingxiao Jiang

Research Collection School Of Computing and Information Systems

We examine the learning curves of individual software developers in Open-Source Software (OSS) Development. We collected the dataset of multi-year code change histories from the repositories for five open source software projects involving more than 100 developers. We build and estimate regression models to assess individual developers' learning progress (in reducing the likelihood they may make a bug). Our estimation results show that developer's coding experience does not decrease bug ratios while cumulative bug-fixing experience leads to learning progress. The results may have implications and provoke future research on project management about allocating resources on tasks that add new code …


Diversified Social Influence Maximization, Fangshuang Tang, Qi Liu, Hengshu Zhu, Enhong Chen, Feida Zhu Aug 2014

Diversified Social Influence Maximization, Fangshuang Tang, Qi Liu, Hengshu Zhu, Enhong Chen, Feida Zhu

Research Collection School Of Computing and Information Systems

For better viral marketing, there has been a lot of research on social influence maximization. However, the problem that who is influenced and how diverse the influenced population is, which is important in real-world marketing, has largely been neglected. To that end, in this paper, we propose to consider the magnitude of influence and the diversity of the influenced crowd simultaneously. Specifically, we formulate it as an optimization problem, i.e., diversified social influence maximization. First, we present a general framework for this problem, under which we construct a class of diversity measures to quantify the diversity of the influenced crowd. …


The Use Of Business Intelligence Techniques In Supply Chain Performance, Jue Gu Jul 2014

The Use Of Business Intelligence Techniques In Supply Chain Performance, Jue Gu

Open Access Theses

Who likes data? Businesses are always loyal data followers. Companies analyze various forms of data to maintain businesses and identify their current performance in different areas so they can find business opportunities to improve and obtain more market share in advance (Qrunfleh & Tarafdar, 2012). When Big Data comes to businesses, companies who can take advantage of data the best tend to regularly get more business and customers (Waller & Fawcett, 2013). Collecting, analyzing, and demonstrating data could be essential to a single business, a company's supply chain performance and its sustainability. As an intelligent data processing product in terms …


Board Interlock Networks And The Use Of Relative Performance Evaluation, Qian Hao, Nan Hu, Ling Liu, Lee J. Yao Jul 2014

Board Interlock Networks And The Use Of Relative Performance Evaluation, Qian Hao, Nan Hu, Ling Liu, Lee J. Yao

Research Collection School Of Computing and Information Systems

Purpose - The purpose of this paper is to explore how networks of boards of directors affect relative performance evaluation (RPE) in chief executive officer (CEO) compensation. Design/methodology/approach - In this study, the authors propose that an interlocking network is an important inter-corporate setting, which has a bearing on whether boards decide to use RPE in CEO compensation. They adopt four typical graph measures to depict the centrality/position of each board in the interlock network: degree, betweenness, eigenvector and closeness, and study their impacts on RPE use. Findings - The authors find that firms that have more connected board members …


A Retail Bank's Bpm Experience, Shankararaman, Venky, Gottipati Swapna, Randall E. Duran Jul 2014

A Retail Bank's Bpm Experience, Shankararaman, Venky, Gottipati Swapna, Randall E. Duran

Research Collection School Of Computing and Information Systems

This real-life case study, which was undertaken by a leading financial services group in the Asia-Pacific region, is used to demonstrate the innovative use of BPM (Business Process Management) technology in a competitive business area. It describes how a BPM project, within the Application Verification and Capture (AVC), was conceived, designed and implemented in order to deliver strategic value to the organization. Hereafter, the financial services group will be referred to as “the bank”. The AVC project was targeted at one of the bank's processes called the Application Verification and Capture (AVC) process for unit trust products. This process involved …


Near-Optimal Nonmyopic Contact Center Planning Using Dual Decomposition, Akshat Kumar, Sudhanshu Singh, Pranav Gupta, Gyana Parija Jul 2014

Near-Optimal Nonmyopic Contact Center Planning Using Dual Decomposition, Akshat Kumar, Sudhanshu Singh, Pranav Gupta, Gyana Parija

Research Collection School Of Computing and Information Systems

We address the problem of minimizing staffing cost in a contact center subject to service level requirements over multiple weeks. We handle both the capacity planning and agent schedule generation aspect of this problem. Our work incorporates two unique business requirements. First, we develop techniques that can provide near-optimal staffing for 247 contact centers over long term, upto eight weeks, rather than planning myopically on a week-on-week basis. Second, our approach is usable in an online interactive setting in which staffing managers using our system expect high quality plans within a short time period. Results on large real world and …


Personality And Programming, Amy B. Woszczynski, Tracy C. Guthrie, Sherri Shade Jun 2014

Personality And Programming, Amy B. Woszczynski, Tracy C. Guthrie, Sherri Shade

Sherri Shade

Information systems students continue to struggle to successfully complete computer programming classes. Learning how to program is difficult, and failure and attrition rates in college level programming classes remain at an unacceptably high rate. Since many IS students take a programming course as part of their program of study, IS educators should better understand why IS students tend to achieve low success rates in programming courses and what can be done to improve success rates. Little research to date has addressed potential reasons for student failure in programming principles courses. Many educators simply assume that high failure rates are acceptable …


A Call To Is Educators To Respond To The Voices Of Women In Information Security, Amy B. Woszczynski, Sherri Shade Jun 2014

A Call To Is Educators To Respond To The Voices Of Women In Information Security, Amy B. Woszczynski, Sherri Shade

Sherri Shade

Much prior research has examined the dearth of women in the IT industry. The purpose of this study is to examine the perceptions of women in IT within the context of information security and assurance. This paper describes results from a study of a relatively new career path to see if there are female-friendly opportunities that have not existed in previous IT career paths. Research methodology focuses on a qualitative analysis of in-depth interviews with women who are self-described information security professionals. A primary goal of the study is to understand the perceptions of women in information security and determine …


Architectural Control And Value Migration In Layered Ecosystems: The Case Of Open-Source Cloud Management Platforms, Richard Tee, C. Jason Woodard Jun 2014

Architectural Control And Value Migration In Layered Ecosystems: The Case Of Open-Source Cloud Management Platforms, Richard Tee, C. Jason Woodard

C. Jason Woodard

Our paper focuses on strategic decision making in layered business ecosystems, highlighting the role of cross-layer interactions in shaping choices about product design and platform governance. Based on evidence from the cloud computing ecosystem, we analyze how concerns about architectural control and expectations regarding future value migration influence the design of product interfaces and the degree of openness to external contributions. We draw on qualitative longitudinal data to trace the development of two open-source platforms for managing cloud-based computing resources. We focus in particular on the emergence of a layered "stack" in which these platforms must compete with both vertically …


Cugar: A Model For Open Innovation In Science And Technology Parks, Arcot Desai Narasimhalu Jun 2014

Cugar: A Model For Open Innovation In Science And Technology Parks, Arcot Desai Narasimhalu

Arcot Desai NARASIMHALU

This paper reviews key elements of a Science or Technology Park in the context of open innovation. Insights into and recommendations on key issues related to intellectual property, licensing and venture capital that would be of interest to any Science Park are presented later.


Innovating Services In Science And Technology Parks, Arcot Desai Narasimhalu Jun 2014

Innovating Services In Science And Technology Parks, Arcot Desai Narasimhalu

Arcot Desai NARASIMHALU

Science and Technology Parks are in the business of providing services to their tenants, a mix of large companies, Small and Medium Enterprises and startups. The service needs of each of these types of companies will be different. The quality of services can be improved by understanding the needs of the tenants both, prior to building the Science and Technology Parks as well as on an ongoing basis. This paper introduces the CUGAR model for Science and Technology Parks as well as Service Innovation Design framework. It then proceeds to discuss how the Service Innovation framework could be applied to …