Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

Databases and Information Systems

2010

Institution
Keyword
Publication
Publication Type
File Type

Articles 1 - 23 of 23

Full-Text Articles in Business

On-Line Discovery Of Hot Motion Paths, Dimitris Sacharidis, Kostas Patroumpas, Manolis Terrovitis, Verena Kantere, Michalis Potamias, Kyriakos Mouratidis, Timos Sellis Dec 2010

On-Line Discovery Of Hot Motion Paths, Dimitris Sacharidis, Kostas Patroumpas, Manolis Terrovitis, Verena Kantere, Michalis Potamias, Kyriakos Mouratidis, Timos Sellis

Kyriakos MOURATIDIS

We consider an environment of numerous moving objects, equipped with location-sensing devices and capable of communicating with a central coordinator. In this setting, we investigate the problem of maintaining hot motion paths, i.e., routes frequently followed by multiple objects over the recent past. Motion paths approximate portions of objects' movement within a tolerance margin that depends on the uncertainty inherent in positional measurements. Discovery of hot motion paths is important to applications requiring classification/profiling based on monitored movement patterns, such as targeted advertising, resource allocation, etc. To achieve this goal, we delegate part of the path extraction process to objects, …


Two Essays On The Accounting Treatment For Information Technology Expenditures, Kimberly Swanson Church Dec 2010

Two Essays On The Accounting Treatment For Information Technology Expenditures, Kimberly Swanson Church

Graduate Theses and Dissertations

The current accounting measurement and reporting system is ill-equipped to provide intangible investment information that is decision useful for stakeholders in the information economy. Potentially relevant intangible items are not reported on the balance sheet, since current standards mandate the immediate expensing of these intangible items. Presumably FASB's uncertainty with the fundamental issues of extent and timing of future benefits to the firm has led to concerns with relevance, reliability, and objectivity of capitalizing some intangibles, which results in potential long term value generating expenditures being immediately expensed on the income statement. Prior research has demonstrated extent and timing of …


Business Network-Based Value Creation In Electronic Commerce, Robert John Kauffman, Ting Li, Eric Van Heck Oct 2010

Business Network-Based Value Creation In Electronic Commerce, Robert John Kauffman, Ting Li, Eric Van Heck

Research Collection School Of Computing and Information Systems

Information technologies (IT) have affected economic activities within and beyond the boundaries of the firm, changing the face of e-commerce. This article explores the circumstances under which value is created in business networks made possible by IT. Business networks combine the capabilities of multiple firms to produce and deliver products and services that none of them could more economically produce on its own and for which there is demand in the market. We call this business network-based value creation. We apply economic theory to explain the conditions under which business networks will exist and are able to sustain their value-producing …


Choosing Management Information Systems As A Major: Understanding The Smifactors For Mis, Thomas W. Ferratt, Stephen R. Hall, Jayesh Prasad, Donald E. Wynn Aug 2010

Choosing Management Information Systems As A Major: Understanding The Smifactors For Mis, Thomas W. Ferratt, Stephen R. Hall, Jayesh Prasad, Donald E. Wynn

MIS/OM/DS Faculty Publications

Given declining management information systems (MIS) enrollments at our university, we seek to understand our students‘ selection of a major. Prior studies have found that students choose a major based on a number of factors, with subject matter interest consistently being most important. We contribute to the literature by developing a deeper understanding of what is meant by subject matter interest, which we refer to as smiFactors, for MIS as a major and career. Based on a qualitative analysis of open-ended survey questions completed by undergraduate business students, we confirm a number of smiFactors for MIS gleaned from recent studies …


Trust Perceptions Of Online Travel Information By Different Content Creators: Some Social And Legal Implications., Stephen Burgess, Carmine Sellitto, Carmen Cox, Jeremy Buultjens Jul 2010

Trust Perceptions Of Online Travel Information By Different Content Creators: Some Social And Legal Implications., Stephen Burgess, Carmine Sellitto, Carmen Cox, Jeremy Buultjens

Carmen Cox

Consumers are increasingly turning to the online environment to provide information to assist them in making purchase decisions related to travel products. They often rely on travel recommendations from different sources, such as sellers, independent experts and, increasingly, other consumers. A new type of online content, user-generated content (UGC), provides a number of legal and social challenges to providers and users of that content, especially in relation to areas such as defamation, misrepresentation and social embarrassment. This paper reports research that examined the level of trustworthiness of online travel information from these different sources. The study used a survey of …


Can The Presence Of Online Word Of Mouth Increase Product Sales?, Alanah Mitchell, Deepak Khazanchi Jul 2010

Can The Presence Of Online Word Of Mouth Increase Product Sales?, Alanah Mitchell, Deepak Khazanchi

Information Systems and Quantitative Analysis Faculty Publications

The power and potential impact of online word of mouth has increased substantially. Consumers have come to accept and rely upon online word of mouth, so it is important to understand how it works and what kind of impact it has on online product sales. This article provides an assessment of this question through an analysis of sales and online word of mouth data from a multi-product e-commerce retail firm.


A Call To Is Educators To Respond To The Voices Of Women In Information Security, Amy B. Woszczynski, Sherri Shade Jul 2010

A Call To Is Educators To Respond To The Voices Of Women In Information Security, Amy B. Woszczynski, Sherri Shade

Faculty and Research Publications

Much prior research has examined the dearth of women in the IT industry. The purpose of this study is to examine the perceptions of women in IT within the context of information security and assurance. This paper describes results from a study of a relatively new career path to see if there are female-friendly opportunities that have not existed in previous IT career paths. Research methodology focuses on a qualitative analysis of in-depth interviews with women who are self-described information security professionals. A primary goal of the study is to understand the perceptions of women in information security and determine …


Re-Solving Stochastic Programming Models For Airline Revenue Management, Lijian Chen, Tito Homem-De-Mello Jun 2010

Re-Solving Stochastic Programming Models For Airline Revenue Management, Lijian Chen, Tito Homem-De-Mello

MIS/OM/DS Faculty Publications

We study some mathematical programming formulations for the origin-destination model in airline revenue management. In particular, we focus on the traditional probabilistic model proposed in the literature. The approach we study consists of solving a sequence of two-stage stochastic programs with simple recourse, which can be viewed as an approximation to a multi-stage stochastic programming formulation to the seat allocation problem. Our theoretical results show that the proposed approximation is robust, in the sense that solving more successive two-stage programs can never worsen the expected revenue obtained with the corresponding allocation policy. Although intuitive, such a property is known not …


Variance Reduction Techniques For Estimating Quantiles And Value-At-Risk, Fang Chu May 2010

Variance Reduction Techniques For Estimating Quantiles And Value-At-Risk, Fang Chu

Dissertations

Quantiles, as a performance measure, arise in many practical contexts. In finance, quantiles are called values-at-risk (VARs), and they are widely used in the financial industry to measure portfolio risk. When the cumulative distribution function is unknown, the quantile can not be computed exactly and must be estimated. In addition to computing a point estimate for the quantile, it is important to also provide a confidence interval for the quantile as a way of indicating the error in the estimate. A problem with crude Monte Carlo is that the resulting confidence interval may be large, which is often the case …


Capacity-Driven Pricing Mechanism In Special Service Industries, Lijian Chen, Suraj M. Alexander May 2010

Capacity-Driven Pricing Mechanism In Special Service Industries, Lijian Chen, Suraj M. Alexander

MIS/OM/DS Faculty Publications

We propose a capacity driven pricing mechanism for several service industries in which the customer behavior, the price demand relationship, and the competition are significantly distinct from other industries. According our observation, we found that the price demand relationship in these industries cannot be modeled by fitted curves; the customers would neither plan in advance nor purchase the service strategically; and the competition would be largely local. We analyze both risk neutral and risk aversion pricing models and conclude the proposed capacity driven model would be the optimal solution under mild assumptions. The resulting pricing mechanism has been implemented at …


Do You Trust To Get Trust? A Study Of Trust Reciprocity Behaviors And Reciprocal Trust Prediction, Viet-An Nguyen, Ee Peng Lim, Hwee Hoon Tan, Jing Jiang, Aixin Sun Apr 2010

Do You Trust To Get Trust? A Study Of Trust Reciprocity Behaviors And Reciprocal Trust Prediction, Viet-An Nguyen, Ee Peng Lim, Hwee Hoon Tan, Jing Jiang, Aixin Sun

Research Collection School Of Computing and Information Systems

Trust reciprocity, a special form of link reciprocity, exists in many networks of trust among users. In this paper, we seek to determine the extent to which reciprocity exists in a trust network and develop quantitative models for measuring reciprocity and reciprocity related behaviors. We identify several reciprocity behaviors and their respective measures. These behavior measures can be employed for predicting if a trustee will return trust to her trustor given that the latter initiates a trust link earlier. We develop for this reciprocal trust prediction task a number of ranking method and classification methods, and evaluated them on an …


Local Coordination Under Bounded Rationality: Coase Meets Simon, Finds Hayek, C. Jason Woodard Mar 2010

Local Coordination Under Bounded Rationality: Coase Meets Simon, Finds Hayek, C. Jason Woodard

Research Collection School Of Computing and Information Systems

This paper explores strategic behavior in a network of firms using an agent-based model. The model exhibits a tension between economic efficiency and the stability of the network in the face of incentives to change its configuration. This tension is to be expected because the conditions of the Coase theorem are violated: the boundedly rational firms in the model lack the ability to discover efficient network configurations or achieve them through collective action. In computational experiments, as predicted by theory, firms frequently became locked into inefficient outcomes or endless cycles of mutual frustration. However, simple institutional innovations such as property …


Differentiating Knowledge Processes In Organisational Learning: A Case Of “Two Solitudes”, Siu Loon Hoe, Steven Mcshane Mar 2010

Differentiating Knowledge Processes In Organisational Learning: A Case Of “Two Solitudes”, Siu Loon Hoe, Steven Mcshane

Research Collection School Of Computing and Information Systems

The fields of organizational behavior (OB)/strategy and marketing have taken different paths over the past two decades to understanding organizational learning. OB/strategy has been pre-occupied with theory development and case study illustrations, whereas marketing has taken a highly quantitative path. Although relying on essentially the same foundation theory, the two disciplines have had minimal crossfertilization. Furthermore, both fields tend to blur or usually ignore the distinction between structural and informal knowledge processes. The purpose of the paper is to highlight the distinction between informal and structural knowledge acquisition and dissemination processes and propose new definitions to differentiate them. Future research …


Understanding Cognitive Differences In Processing Competing Visualizations Of Complex Systems, Madhavi Mukul Chakrabarty Jan 2010

Understanding Cognitive Differences In Processing Competing Visualizations Of Complex Systems, Madhavi Mukul Chakrabarty

Dissertations

Node-link diagrams are used represent systems having different elements and relationships among the elements. Representing the systems using visualizations like node-link diagrams provides cognitive aid to individuals in understanding the system and effectively managing these systems. Using appropriate visual tools aids in task completion by reducing the cognitive load of individuals in understanding the problems and solving them. However, the visualizations that are currently developed lack any cognitive processing based evaluation. Most of the evaluations (if any) are based on the result of tasks performed using these visualizations. Therefore, the evaluations do not provide any perspective from the point of …


Job Seeking And Job Application In Social Networking Sites : Predicting Job Seekers' Behavioral Intentions, Maria Marcella Plummer Jan 2010

Job Seeking And Job Application In Social Networking Sites : Predicting Job Seekers' Behavioral Intentions, Maria Marcella Plummer

Dissertations

Social networking sites (SNSs) are revolutionizing the way in which employers and job seekers connect and interact with each other. Despite the reported benefits of SNSs with respect to finding a job, there are issues such as privacy concerns that might be deterring job seekers from using these sites in their attempts to secure a job. It is therefore important to understand the factors that are salient in predicting job seekers' use of SNSs in applying for jobs.

In this research, a theoretical model was developed to explicate job seekers' intentions to use SNSs to apply for jobs. Two aspects …


Virtual World Commerce Adoption (Vwca) : A Case Study Of Second Life Investigating The Impacts Of Perceived Affordances, Trust, And Need Satisfaction, Kamolbhan Olapiriyakul Jan 2010

Virtual World Commerce Adoption (Vwca) : A Case Study Of Second Life Investigating The Impacts Of Perceived Affordances, Trust, And Need Satisfaction, Kamolbhan Olapiriyakul

Dissertations

Virtual worlds are computer-simulated worlds in which multi-players can simultaneously interact in a rich graphical environment. The development of virtual worlds, along with the massive growth of users, creates opportunities for business organizations. This dissertation involves many studies regarding virtual world adoption in business by virtual consumers.

Most of the research in Information Systems (IS) was conducted investigating factors influencing technology adoption, such as ease of use and usefulness, subjective norms and behavioral controls, self-efficacy, performance and effort expectancy, flow, etc. However, most of these research studies focused neither on design aspects related to affordances nor users' goal-oriented behaviors, such …


Spreadsheets Grow Up: Three Spreadsheet Engineering Methodologies For Large Financial Planning Models, Thomas A. Grossman Jr., O Ozluk Jan 2010

Spreadsheets Grow Up: Three Spreadsheet Engineering Methodologies For Large Financial Planning Models, Thomas A. Grossman Jr., O Ozluk

Business Analytics and Information Systems

Many large financial planning models are written in a spreadsheet programming language (usually Microsoft Excel) and deployed as a spreadsheet application. Three groups, FAST Alliance, Operis Group, and BPM Analytics (under the name “Spreadsheet Standards Review Board”) have independently promulgated standardized processes for efficiently building such models. These spreadsheet engineering methodologies provide detailed guidance on design, construction process, and quality control. We summarize and compare these methodologies. They share many design practices, and standardized, mechanistic procedures to construct spreadsheets. We learned that a written book or standards document is by itself insufficient to understand a methodology. These methodologies represent a …


A Correlational Study Of Telework Frequency, Information Communication Technology, And Job Satisfaction Of Home-Based Teleworkers, Shana P. Webster-Trotman Jan 2010

A Correlational Study Of Telework Frequency, Information Communication Technology, And Job Satisfaction Of Home-Based Teleworkers, Shana P. Webster-Trotman

Walden Dissertations and Doctoral Studies

In 2008, 33.7 million Americans teleworked from home. The Telework Enhancement Act (S. 707) and the Telework Improvements Act (H.R. 1722) of 2009 were designed to increase the number of teleworkers. The research problem addressed was the lack of understanding of factors that influence home-based teleworkers' job satisfaction. Job dissatisfaction has been found to have a significant impact on voluntary turnover. The purpose of the study was to assess the relationship among telework frequency, information communication technology (ICT), and job satisfaction. The research questions were designed to answer whether correlational relationships exist among telework frequency, ICT, and job satisfaction and …


A Structural Equation Model Of The Factors Associated With Influence And Power Of It Departments And Their Relationship To Firm's It Orientation And Business Performance, Raghu V. Kowshik Jan 2010

A Structural Equation Model Of The Factors Associated With Influence And Power Of It Departments And Their Relationship To Firm's It Orientation And Business Performance, Raghu V. Kowshik

Walden Dissertations and Doctoral Studies

Although few firms can function without an information technology (IT) department, senior executives often consider IT as secondary. Historically, studies have found IT departments to have low influence and power status compared to other departments. Few, if any, studies have investigated what factors contribute to this subservient position. Three research questions that inspired this study regarding the IT department's influence and power included factors that shape the IT influence and power, the consequences for the firm's IT orientation and business performance, and how firm's IT orientation affects business performance. This quantitative study explored the notion that accountability, innovativeness, customer connectedness …


Database Security: What Students Need To Know, Meg C. Murray Jan 2010

Database Security: What Students Need To Know, Meg C. Murray

Faculty and Research Publications

Database security is a growing concern evidenced by an increase in the number of reported incidents of loss of or unauthorized exposure to sensitive data. As the amount of data collected, retained and shared electronically expands, so does the need to understand database security. The Defense Information Systems Agency of the US Department of Defense (2004), in its Database Security Technical Implementation Guide, states that database security should provide controlled, protected access to the contents of a database as well as preserve the integrity, consistency, and overall quality of the data. Students in the computing disciplines must develop an …


Applying Soft Cluster Analysis Techniques To Customer Interaction Information, Randall E. Duran, Li Zhang, Tom Hayhurst Jan 2010

Applying Soft Cluster Analysis Techniques To Customer Interaction Information, Randall E. Duran, Li Zhang, Tom Hayhurst

Research Collection School Of Computing and Information Systems

The number of channels available for companies and customers to communicate with one another has increased dramatically over the past several decades. Although some market segmentation efforts utilize high-level customer interaction statistics, in-depth information regarding customers’ use of different communication channels is often ignored. Detailed customer interaction information can help companies improve the way that they market to customers by taking into consideration customers’ behaviour patterns and preferences. However, a key challenge of interpreting customer contact information is that many channels have only been in existence for a relatively short period of time, and thus, there is limited understanding and …


Digital Multi-Media And The Limits Of Privacy Law, Jacqueline D. Lipton Jan 2010

Digital Multi-Media And The Limits Of Privacy Law, Jacqueline D. Lipton

Articles

While digital video and multi-media technologies are becoming increasingly prevalent, existing privacy laws tend to focus on text-based personal records. Individuals have little recourse when concerned about infringements of their privacy interests in audio, video, and multi-media files. Often people are simply unaware that video or audio records have been made. Even if they are aware of the existence of the records, they may be unaware of potential legal remedies, or unable to afford legal recourse. This paper concentrates on the ability of individuals to obtain legal redress for unauthorized use of audio, video and multi-media content that infringes their …


Wikipedia And The European Union Database Directive, Jacqueline D. Lipton Jan 2010

Wikipedia And The European Union Database Directive, Jacqueline D. Lipton

Articles

“Web 2.0" and "User Generated Content (UGC)" are the new buzzwords in cyberspace. In recent years, law and policy makers have struggled to keep pace with the needs of digital natives in terms of online content control in the new participatory web culture. Much of the discourse about intellectual property rights in this context revolves around copyright law: for example, who owns copyright in works generated by multiple people, and what happens when these joint authored works borrow from existing copyright works in terms of derivative works rights and the fair use defense. Many works compiled by groups are subject …