Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 21 of 21

Full-Text Articles in Business

Vungle Inc. Improves Monetization Using Big-Data Analytics, Bert De Reyck, Ioannis Fragkos, Yael Gruksha-Cockayne, Casey Lichtendahl, Hammond Guerin, Andre Kritzer Oct 2017

Vungle Inc. Improves Monetization Using Big-Data Analytics, Bert De Reyck, Ioannis Fragkos, Yael Gruksha-Cockayne, Casey Lichtendahl, Hammond Guerin, Andre Kritzer

Research Collection Lee Kong Chian School Of Business

The advent of big data has created opportunities for firms to customize their products and services to unprecedented levels of granularity. Using big data to personalize an offering in real time, however, remains a major challenge. In the mobile advertising industry, once a customer enters the network, an ad-serving decision must be made in a matter of milliseconds. In this work, we describe the design and implementation of an ad-serving algorithm that incorporates machine-learning methods to make personalized ad-serving decisions within milliseconds. We developed this algorithm for Vungle Inc., one of the largest global mobile ad networks. Our approach also …


Combining Machine-Based And Econometrics Methods For Policy Analytics Insights, Robert J. Kauffman, Kwansoo Kim, Sang-Yong Tom Lee, Ai Phuong Hoang, Jing Ren Sep 2017

Combining Machine-Based And Econometrics Methods For Policy Analytics Insights, Robert J. Kauffman, Kwansoo Kim, Sang-Yong Tom Lee, Ai Phuong Hoang, Jing Ren

Research Collection School Of Computing and Information Systems

Computational Social Science (CSS) has become a mainstream approach in the empirical study of policy analytics issues in various domains of e-commerce research. This article is intended to represent recent advances that have been made for the discovery of new policy-related insights in business, consumer, and social settings. The approach discussed is fusion analytics, which combines machine-based methods from Computer Science (CS) and explanatory empiricism involving advanced Econometrics and Statistics. It explores several efforts to conduct research inquiry in different functional areas of Electronic Commerce and Information Systems (IS), with applications that represent different functional areas of business, as well …


Zero Textbook Cost Syllabus For Cis 3367 (Spreadsheet Applications In Business), Soniya Dsouza Aug 2017

Zero Textbook Cost Syllabus For Cis 3367 (Spreadsheet Applications In Business), Soniya Dsouza

Open Educational Resources

The primary focus of this course is to learn how to construct and use powerful spreadsheets for effective managerial decision-making. This course is mostly project- oriented with a dual focus on spreadsheet engineering and quantitative modeling of financial applications. Students will learn to develop powerful spreadsheet models and perform data analysis using Pivot Tables, VLookUp, Data Validation techniques and Sub Total functions. Students will also learn how to enhance spreadsheets by creating dashboards on financial data. The Visual Basic (macro) concepts will also be introduced to students. With the knowledge and hands-on experience of these concepts, students will be prepared …


Multi-Authority Abs Supporting Dendritic Access Structure, Ruo Mo, Jian-Feng Ma, Ximeng Liu, Qi Li Jul 2017

Multi-Authority Abs Supporting Dendritic Access Structure, Ruo Mo, Jian-Feng Ma, Ximeng Liu, Qi Li

Research Collection School Of Computing and Information Systems

Attribute-based signature (ABS), which could realize fine-grained access control, was considered to be an importantmethod for anonymous authentication in cloud computing. However, normal ABS only provided simple accesscontrol through threshold structure and thus could not cope with the large-scale attribute sets of users in the cloud. Moreover,the attribute sets were supervised by only one attribute authority, which increased the cost of computation and storage.The whole system was in danger of collapsing once the attribute authority was breached. Aiming at tackling theproblems above, a novel scheme, was proposed called multi-authority ABS supporting dendritic access structure whichsupported any AND, OR and threshold …


How To Enable Future Faster Payments? An Evaluation Of A Hybrid Payments Settlement Mechanism, Zhiling Guo, Yuanzhi Huang Jul 2017

How To Enable Future Faster Payments? An Evaluation Of A Hybrid Payments Settlement Mechanism, Zhiling Guo, Yuanzhi Huang

Research Collection School Of Computing and Information Systems

In the era of Fintech innovation and e-commerce, faster settlement of massive retail transactions is crucial for business growth and financial system stability. However, speeding up payments settlement can create periodic liquidity shortfalls to banks which would incur high cost of funds in the settlement process. We propose a new hybrid settlement mechanism design that integrates features of real-time gross settlement, deferred net settlement, and central queue management structure. The hybrid mechanism is managed by an intermediary and is particularly suitable to settle large volume of small-value retail payments. We evaluate the mechanism using computer experiments and simulation. We find …


Does Director Interlock Impact The Diffusion Of Accounting Method Choice?, Jie Han, Nan Hu, Ling Liu, Gaoliang Tian Jul 2017

Does Director Interlock Impact The Diffusion Of Accounting Method Choice?, Jie Han, Nan Hu, Ling Liu, Gaoliang Tian

Research Collection School Of Computing and Information Systems

This paper examines the influence of director interlock on firms' discrete accounting method choices from the perspective of behavior diffusion. We argue that firm managers will imitate their interlocked-partner firm's accounting method choices when choosing their own accounting methods. We find that when there is an interlock relationship between two firms, their accounting method choices, including inventory and depreciation methods, are similar to each other, indicating that accounting method choices can diffuse across firms through director interlock. In addition, such similarity is greater the longer the interlock relationship between the two firms is and as uncertainty increases. Further, the interlock …


Mining Capstone Project Wikis For Knowledge Discovery, Swapna Gottipati, Venky Shankararaman, Melvrivk Goh Jul 2017

Mining Capstone Project Wikis For Knowledge Discovery, Swapna Gottipati, Venky Shankararaman, Melvrivk Goh

Research Collection School Of Computing and Information Systems

Wikis are widely used collaborative environments as sources of information and knowledge. The facilitate students to engage in collaboration and share information among members and enable collaborative learning. In particular, Wikis play an important role in capstone projects. Wikis aid in various project related tasks and aid to organize information and share. Mining project Wikis is critical to understand the students learning and latest trends in industry. Mining Wikis is useful to educationists and academicians for decision-making about how to modify the educational environment to improve student's learning. The main challenge is that the content or data in project Wikis …


Marketing The Mountain State: A Large N Study Of User Engagement On Twitter, Kirk Richardson Jun 2017

Marketing The Mountain State: A Large N Study Of User Engagement On Twitter, Kirk Richardson

Capstone Projects – Politics and Government

Much of the evolving research on the use of social media in destination marketing emphasizes how information diffusion influences the reputational image of place. The present study uses Twitter data to focus on the relative differences in user engagement across discrete account types. Specifically, this is done to examine how the official destination marketing organization of Montana—the Montana Office of Tourism (MTOT)—performs relative to other account types. Several regression analyses conducted on Twitter data associated with an ongoing MTOT place branding campaign reveal that tweets sent from ‘official’ accounts are more likely to be retweeted, and are estimated to receive …


The Dark Side Of Banning Hacking Technique Discussion, Qiu-Hong Wang, Ting Zhang Le Jun 2017

The Dark Side Of Banning Hacking Technique Discussion, Qiu-Hong Wang, Ting Zhang Le

Research Collection School Of Computing and Information Systems

Prior studies have evidenced the effectiveness of more severe and broader enforcement in deterringcybercrimes. This study addresses the other side of the story. Our data analysis shows that theenforcement against the production / distribution / possession of computer misuse tools tends toincrease the contribution on detection and protection related posts in online hacker forums. Butthis enforcement may discourage those contributors who had originally actively contributed to theprotection discussions. Thus government regulations have to be cautiously justify the incentives ofmultiple parties in the cybersecurity context.


Charitable Fundraising: Gaining Donors' Trust On Online Platforms, Deserinas Sulaeman Jun 2017

Charitable Fundraising: Gaining Donors' Trust On Online Platforms, Deserinas Sulaeman

Research Collection School Of Computing and Information Systems

Trust is crucial in the relationships between charitable fundraisers and potential donors. This study examines factors that can help fundraisers gain potential donors’ trust, which is crucial to the success of the campaigns. Examining charitable fundraising campaigns on an online platform, this study finds that trust issues can be mitigated by providing a campaign description that is more sophisticated, more informative, and with fewer errors. Additionally, setting a higher campaign funding goal tends to lead to a more successful campaign. These characteristics likely reflect a competent, committed, and passionate fundraiser. On the other hand, mere exposure to a wide set …


On Self-Selection Biases In Online Product Reviews, Nan Hu, Paul A. Pavlou, Jie Zhang Jun 2017

On Self-Selection Biases In Online Product Reviews, Nan Hu, Paul A. Pavlou, Jie Zhang

Research Collection School Of Computing and Information Systems

Online product reviews help consumers infer product quality, and the mean (average) rating is often used as a proxy for product quality. However, two self-selection biases, acquisition bias (mostly consumers with a favorable predisposition acquire a product and hence write a product review) and underreporting bias (consumers with extreme, either positive or negative, ratings are more likely to write reviews than consumers with moderate product ratings), render the mean rating a biased estimator of product quality, and they result in the well-known J-shaped (positively skewed, asymmetric, bimodal) distribution of online product reviews. To better understand the nature and consequences of …


Online Advertising, Retail Platform Openness, And Long Tail Sellers, Jianqing Chen, Zhiling Guo Jun 2017

Online Advertising, Retail Platform Openness, And Long Tail Sellers, Jianqing Chen, Zhiling Guo

Research Collection School Of Computing and Information Systems

It becomes increasingly popular that some large online retailers such as Amazon open their platforms to allow third-party retail competitors to sell on their own platforms. We develop an analytical model to examine this retailer market place model and its business impact. We assume that a leading retailer has both valuation advantage that may come from its reputation and information advantage that may come from its brand awarenewss. We find that the availability of relatively low-cost advertising through social media or search engine can effectively reduce the leading retailer's information advantage, and thus be an important driving force for its …


The Retransmission Of Rumor And Rumor Correction Messages On Twitter, Alton Y. K. Chua, Cheng-Ying Tee, Augustine Pang, Ee-Peng Lim Jun 2017

The Retransmission Of Rumor And Rumor Correction Messages On Twitter, Alton Y. K. Chua, Cheng-Ying Tee, Augustine Pang, Ee-Peng Lim

Research Collection Lee Kong Chian School Of Business

This article seeks to examine the relationships among source credibility, message plausibility, message type (rumor or rumor correction) and retransmission of tweets in a rumoring situation. From a total of 5,885 tweets related to the rumored death of the founding father of Singapore Lee Kuan Yew, 357 original tweets without an “RT” prefix were selected and analyzed using negative binomial regression analysis. The results show that source credibility and message plausibility are correlated with retransmission. Also, rumor correction tweets are retweeted more than rumor tweets. Moreover, message type moderates the relationship between source credibility and retransmission as well as that …


Joint Optimization Of Resource Provisioning In Cloud Computing, Jonathan David Chase, Dusit Niyato May 2017

Joint Optimization Of Resource Provisioning In Cloud Computing, Jonathan David Chase, Dusit Niyato

Research Collection School Of Computing and Information Systems

Cloud computing exploits virtualization to provision resources efficiently. Increasingly, Virtual Machines (VMs) have high bandwidth requirements; however, previous research does not fully address the challenge of both VM and bandwidth provisioning. To efficiently provision resources, a joint approach that combines VMs and bandwidth allocation is required. Furthermore, in practice, demand is uncertain. Service providers allow the reservation of resources. However, due to the dangers of over-and under-provisioning, we employ stochastic programming to account for this risk. To improve the efficiency of the stochastic optimization, we reduce the problem space with a scenario tree reduction algorithm, that significantly increases tractability, whilst …


Country 2.0: Upgrading Cities With Smart Technologies, Steven M. Miller May 2017

Country 2.0: Upgrading Cities With Smart Technologies, Steven M. Miller

Asian Management Insights

Advancements in technology are being used to transform our cities into smart cities, but the process is not without its risks.


The Creation Of A Building Map Application For A University Setting, William T. Whitesell Apr 2017

The Creation Of A Building Map Application For A University Setting, William T. Whitesell

Senior Honors Theses

The use of navigational technology in mobile and web devices has sharply increased in recent years. With the capability to create interactive maps now available, navigating in real time between locations has become possible. This is especially essential in areas and organizations experiencing rapid expansion like Liberty University (LU). Therefore, the author proposes a project to create an interactive map application (IMA) for LU’s academic buildings that is scalable and usable through both the university’s website and with a mobile application. There are several considerations that must be taken into account when creating the LU map application, such as development …


Factored Similarity Models With Social Trust For Top-N Item Recommendation, Guibing Guo, Jie Zhang, Feida Zhu, Xingwei Wang Apr 2017

Factored Similarity Models With Social Trust For Top-N Item Recommendation, Guibing Guo, Jie Zhang, Feida Zhu, Xingwei Wang

Research Collection School of Computing and Information Systems

Trust-aware recommender systems have attracted much attention recently due to the prevalence of social networks. However, most existing trust-based approaches are designed for the recommendation task of rating prediction. Only few trust-aware methods have attempted to recommend users an ordered list of interesting items, i.e., item recommendation. In this article, we propose three factored similarity models with the incorporation of social trust for item recommendation based on implicit user feedback. Specifically, we introduce a matrix factorization technique to recover user preferences between rated items and unrated ones in the light of both user-user and item-item similarities. In addition, we claim …


Understanding The Information-Based Transformation Of Strategy And Society, Eric K. Clemons, Rajiv M. Dewan, Robert J. Kauffman, Thomas A. Weber Apr 2017

Understanding The Information-Based Transformation Of Strategy And Society, Eric K. Clemons, Rajiv M. Dewan, Robert J. Kauffman, Thomas A. Weber

Research Collection School Of Computing and Information Systems

The world economy is undergoing dramatic changes, largely driven by the new availability of fine-grained information. Innovative ways of using data—large and small—have also prompted a rethinking of the boundaries for the combination and use of knowledge. The strategic design of information flows in the economy has the upside of higher economic rents and competitive advantage, as well as the downsides of wealth inequality and abuse of power. This has brought a wide range of regulatory challenges. To understand the nature of these sweeping changes, it is important to examine the new ways information is used, and how information flows …


Inferring User Consumption Preferences From Social Media, Yang Li, Jing Jiang, Ting Liu Mar 2017

Inferring User Consumption Preferences From Social Media, Yang Li, Jing Jiang, Ting Liu

Research Collection School Of Computing and Information Systems

Social Media has already become a new arena of our lives and involved different aspects of our social presence. Users' personal information and activities on social media presumably reveal their personal interests, which offer great opportunities for many e-commerce applications. In this paper, we propose a principled latent variable model to infer user consumption preferences at the category level (e.g. inferring what categories of products a user would like to buy). Our model naturally links users' published content and following relations on microblogs with their consumption behaviors on e-commerce websites. Experimental results show our model outperforms the state-of-the-art methods significantly …


Using An Online Learning Tutorial To Teach Rea Data Modelling In Accounting Information Systems Courses, Poh Sun Seow, Gary Pan Jan 2017

Using An Online Learning Tutorial To Teach Rea Data Modelling In Accounting Information Systems Courses, Poh Sun Seow, Gary Pan

Research Collection School Of Accountancy

Online learning has been gaining widespread adoption due to its success in enhancing student-learning outcomes and improving student academic performance. This paper describes an online tutorial to teach resource-event-agent (REA) data modeling in an undergraduate accounting information systems course. The REA online tutorial reflects a self-study application designed to help students improve their understanding of the REA data model. As such, the tutorial acts as a supplement to lectures by reinforcing the concepts and incorporating practices to assess student understanding. Instructors can access the REA online tutorial at http://smu.sg/rea. An independent survey by the University's Centre for Teaching Excellence found …


Semantic Inference On Clinical Documents: Combining Machine Learning Algorithms With An Inference Engine For Effective Clinical Diagnosis And Treatment, Shuo Yang, Ran Wei, Jingzhi Guo, Lida Xu Jan 2017

Semantic Inference On Clinical Documents: Combining Machine Learning Algorithms With An Inference Engine For Effective Clinical Diagnosis And Treatment, Shuo Yang, Ran Wei, Jingzhi Guo, Lida Xu

Information Technology & Decision Sciences Faculty Publications

Clinical practice calls for reliable diagnosis and optimized treatment. However, human errors in health care remain a severe issue even in industrialized countries. The application of clinical decision support systems (CDSS) casts light on this problem. However, given the great improvement in CDSS over the past several years, challenges to their wide-scale application are still present, including: 1) decision making of CDSS is complicated by the complexity of the data regarding human physiology and pathology, which could render the whole process more time-consuming by loading big data related to patients; and 2) information incompatibility among different health information systems (HIS) …