Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 43

Full-Text Articles in Business

Workshop | Body Worn Video Recorders: The Socio-Technical Implications Of Gathering Direct Evidence, Katina Michael, Alexander Hayes Jun 2015

Workshop | Body Worn Video Recorders: The Socio-Technical Implications Of Gathering Direct Evidence, Katina Michael, Alexander Hayes

Alexander Hayes Mr.

- From in-car video recording to body-worn video recording

- Exploring available technologies: how do they work, pros and cons

- Storing direct evidence in secure storage: factors to consider

- Citizens “shooting” back with POV tech – what are their rights?

- Crowdsourced sousveillance- harnessing public data for forensic profiling

- Police force policies and practices on the application of new media


Development Of Generic Key Performance Indicators For Pmbok® Using A 3d Project Integration Model, Craig Langston Dec 2013

Development Of Generic Key Performance Indicators For Pmbok® Using A 3d Project Integration Model, Craig Langston

Craig Langston

Since Martin Barnes’ so-called ‘iron triangle’ circa 1969, much debate has occurred over how best to describe the fundamental constraints that underpin project success. This paper develops a 3D project integration model for PMBOK® comprising core constraints of scope, cost, time and risk as a basis to propose six generic key performance indicators (KPIs) that articulate successful project delivery. These KPIs are defined as value, efficiency, speed, innovation, complexity and impact and can each be measured objectively as ratios of the core constraints. An overall KPI (denoted as s3/ctr) is also derived. The aim in this paper is to set …


Big Data, Predictive Analytics, And Data Visualization In The Construction Engineering, Joseph Shrestha Dec 2013

Big Data, Predictive Analytics, And Data Visualization In The Construction Engineering, Joseph Shrestha

Joseph Shrestha

The term “big data” is associated with one or more of the four characteristics: volume, variety, and velocity. The technologies associated with the big data has already been proven in other sectors. Internet giants like Google, Facebook, Netflix, etc. uses big data collected from their users to present advertisements, friend recommendations, and TV shows and movies relevant to the specific user. Big data is also used for insurance fraud detection, improving bus system by reducing congestion, predictive flight arrival time, weather forecast, and genomic analysis.
For the construction industry, volume and variety becomes particularly relevant. From project planning to the …


Enhanced Adaptive Management: Integrating Decision Analysis, Scenario Analysis And Environmental Modeling For The Everglades, Matteo Convertino, Christy Foran, Jeffrey Keisler, Lynn Scarlett, Andrew Loschiavo, Greg Kiker, Igor Linkov Sep 2013

Enhanced Adaptive Management: Integrating Decision Analysis, Scenario Analysis And Environmental Modeling For The Everglades, Matteo Convertino, Christy Foran, Jeffrey Keisler, Lynn Scarlett, Andrew Loschiavo, Greg Kiker, Igor Linkov

Jeffrey Keisler

We propose to enhance existing adaptive management efforts with a decision-analytical approach that can
guide the initial selection of robust restoration alternative plans and inform the need to adjust these
alternatives in the course of action based on continuously acquired monitoring information and changing
stakeholder values. We demonstrate an application of enhanced adaptive management for a wetland
restoration case study inspired by the Florida Everglades restoration effort. We find that alternatives
designed to reconstruct the pre-drainage flow may have a positive ecological impact, but may also have high
operational costs and only marginally contribute to meeting other objectives such as …


Cyber Defense As Environmental Protection - The Broader Potential Impact Of Failed Defensive Counter Cyber Operations, Jan Kallberg, Rosemary Burk Jul 2013

Cyber Defense As Environmental Protection - The Broader Potential Impact Of Failed Defensive Counter Cyber Operations, Jan Kallberg, Rosemary Burk

Jan Kallberg

Key in the critique of the likelihood of cyber conflict has been the assumption that cyber does not lead to long-term and irrevocable effects – therefore it cannot be fought as a war. This might be true if cyber attacks are constrained to specific functions of a computer system or set of client computers, however, a failed cyberdefense can have wider effects than discussed in earlier debates of potential consequences and risks. The environmental aspect of cyberdefense has not drawn attention as a national security matter. We all, as people, react to threats to our living space and natural environment. …


Innovation, Proximity, And Knowledge Gatekeepers –Is Proximity A Necessity For Learning And Innovation?, Deogratias Harorimana Dr Jun 2013

Innovation, Proximity, And Knowledge Gatekeepers –Is Proximity A Necessity For Learning And Innovation?, Deogratias Harorimana Dr

Dr Deogratias Harorimana

Organisational desire for innovation and growth can be best achieved when they are in proximity. Geographical or technological proximity represent network structure in which a focal organisation is embedded, which has structural, cognitive and relational dimensions. Proximity influences innovation indirectly by its influence on agents’ ability to exchange and combine knowledge in four related ways: by giving access to exchange partners that provide opportunities for learning, increasing the anticipation of value, increasing the motivation to exchange, and by giving access to resources necessary for committing exchanges.


Improved Decision Making To Underpin The Achievement Of Strategic Goals At The University Of Wollongong, Craig Napier Jun 2013

Improved Decision Making To Underpin The Achievement Of Strategic Goals At The University Of Wollongong, Craig Napier

Craig Napier

The Higher Education sector is an increasingly competitive environment. As such, it is prudent for institutions to seek advantages across all areas that will lead to improved research outcomes, commercial partnerships and student learning experience. The Performance Indicators Unit commenced in 1999 and has evolved to cover seven key perspectives of integration of Information Management across the University, working to avoid the operational silos that can occur within Universities. This session will explore: Utilising network relationship analysis to develop an understanding of the University of Wollongong's collaborations and facilitate improvement The importance of visualisation to translate data into meaningful information …


Virtual Teams And Its Application In New Product Development, R&D And Smes, Nader Ale Ebrahim May 2013

Virtual Teams And Its Application In New Product Development, R&D And Smes, Nader Ale Ebrahim

Nader Ale Ebrahim

A comprehensive definition of virtual teams may be taken as: small temporary groups of geographically, organizationally and/or time dispersed knowledge workers who coordinate their work, predominantly with electronic information and communication technologies in order to accomplish one or more organization tasks (Ale Ebrahim et al., 2009). Nowadays, this definition have gained popularity as found in Wikipedia (wikipedia, 2011). Virtual R&D team is a kind of virtual team that concentrate on the R&D tasks and projects (Ale Ebrahim et al., 2011).


An Analysis Of Extreme Price Shocks And Illiquidity Among Systematic Trend Followers, Bernard Lee, Shih-Fen Cheng, Annie Koh May 2013

An Analysis Of Extreme Price Shocks And Illiquidity Among Systematic Trend Followers, Bernard Lee, Shih-Fen Cheng, Annie Koh

Shih-Fen Cheng

We construct an agent-based model to study the interplay between extreme price shocks and illiquidity in the presence of systematic traders known as trend followers. The agent-based approach is particularly attractive in modeling commodity markets because the approach allows for the explicit modeling of production, capacities, and storage constraints. Our study begins by using the price stream from a market simulation involving human participants and studies the behavior of various trend-following strategies, assuming initially that their participation will not impact the market. We notice an incremental deterioration in strategy performance as and when strategies deviate further and further from the …


Decentralized Decision Support For An Agent Population In Dynamic And Uncertain Domains, Pradeep Reddy Varakantham, Shih-Fen Cheng, Thi Duong Nguyen May 2013

Decentralized Decision Support For An Agent Population In Dynamic And Uncertain Domains, Pradeep Reddy Varakantham, Shih-Fen Cheng, Thi Duong Nguyen

Shih-Fen CHENG

This research is motivated by problems in urban transportation and labor mobility, where the agent flow is dynamic, non-deterministic and on a large scale. In such domains, even though the individual agents do not have an identity of their own and do not explicitly impact other agents, they have implicit interactions with other agents. While there has been much research in handling such implicit effects, it has primarily assumed controlled movements of agents in static environments. We address the issue of decision support for individual agents having involuntary movements in dynamic environments . For instance, in a taxi fleet serving …


Lagrangian Relaxation For Large-Scale Multi-Agent Planning, Geoff Gordon, Pradeep Varakantham, William Yeoh, Hoong Chuin Lau, Shih-Fen Cheng May 2013

Lagrangian Relaxation For Large-Scale Multi-Agent Planning, Geoff Gordon, Pradeep Varakantham, William Yeoh, Hoong Chuin Lau, Shih-Fen Cheng

Shih-Fen Cheng

Multi-agent planning is a well-studied problem with various applications including disaster rescue, urban transportation and logistics, both for autonomous agents and for decision support to humans. Due to computational constraints, existing research typically focuses on one of two scenarios: unstructured domains with many agents where we are content with heuristic solutions, or domains with small numbers of agents or special structure where we can provide provably near-optimal solutions. By contrast, in this paper, we focus on providing provably near-optimal solutions for domains with large numbers of agents, by exploiting a common domain-general property: if individual agents each have limited influence …


Lagrangian Relaxation For Large-Scale Multi-Agent Planning, Geoff Gordon, Pradeep Reddy Varakantham, William Yeoh, Ajay Srinivasan, Hoong Chuin Lau, Shih-Fen Cheng May 2013

Lagrangian Relaxation For Large-Scale Multi-Agent Planning, Geoff Gordon, Pradeep Reddy Varakantham, William Yeoh, Ajay Srinivasan, Hoong Chuin Lau, Shih-Fen Cheng

Shih-Fen CHENG

Multi-agent planning is a well-studied problem with applications in various areas. Due to computational constraints, existing research typically focuses either on unstructured domains with many agents, where we are content with heuristic solutions, or domains with small numbers of agents or special structure, where we can find provably near-optimal solutions. In contrast, here we focus on provably near-optimal solutions in domains with many agents, by exploiting influence limits. To that end, we make two key contributions: (a) an algorithm, based on Lagrangian relaxation and randomized rounding, for solving multi-agent planning problems represented as large mixed-integer programs; (b) a proof of …


Notes On Equilibria In Symmetric Games, Shih-Fen Cheng, Daniel M. Reeves, Yevgeniy Vorobeychik, Michael P. Wellman May 2013

Notes On Equilibria In Symmetric Games, Shih-Fen Cheng, Daniel M. Reeves, Yevgeniy Vorobeychik, Michael P. Wellman

Shih-Fen CHENG

In a symmetric game, every player is identical with respect to the game rules. We show that a symmetric 2strategy game must have a pure-strategy Nash equilibrium. We also discuss Nash’s original paper and its generalized notion of symmetry in games. As a special case of Nash’s theorem, any finite symmetric game has a symmetric Nash equilibrium. Furthermore, symmetric infinite games with compact, convex strategy spaces and continuous, quasiconcave utility functions have symmetric pure-strategy Nash equilibria. Finally, we discuss how to exploit symmetry for more efficient methods of finding Nash equilibria.


Distributing Complementary Resources Across Multiple Periods With Stochastic Demand, Shih-Fen Cheng, John Tajan, Hoong Chuin Lau May 2013

Distributing Complementary Resources Across Multiple Periods With Stochastic Demand, Shih-Fen Cheng, John Tajan, Hoong Chuin Lau

Shih-Fen CHENG

In this paper, we evaluate whether the robustness of a market mechanism that allocates complementary resources could be improved through the aggregation of time periods in which resources are consumed. In particular, we study a multi-round combinatorial auction that is built on a general equilibrium framework. We adopt the general equilibrium framework and the particular combinatorial auction design from the literature, and we investigate the benefits and the limitation of time-period aggregation when demand-side uncertainties are introduced. By using simulation experiments, we show that under stochastic conditions the performance variation of the process decreases as the time frame length (time …


Designing The Market Game For A Commodity Trading Simulation, Shih-Fen Cheng May 2013

Designing The Market Game For A Commodity Trading Simulation, Shih-Fen Cheng

Shih-Fen CHENG

In this paper, we propose to design a market game that (a) can be used in modeling and studying commodity trading scenarios, and (b) can be used in capturing human traders' behaviors. Specifically, we demonstrate the usefulness of this commodity trading game in a single-commodity futures trading scenario. A pilot experiment was run with a mixture of human traders and an autonomous agent that emulates the aggregatedmarket condition, with the assumption that this autonomous agent would hint each of its action through a public announcement. We show that the information collected from this simulation can be used to extract the …


Decision Support For Assorted Populations In Uncertain And Congested Environments, Pradeep Reddy Varakantham, Asrar Ahmed, Shih-Fen Cheng May 2013

Decision Support For Assorted Populations In Uncertain And Congested Environments, Pradeep Reddy Varakantham, Asrar Ahmed, Shih-Fen Cheng

Shih-Fen Cheng

This research is motivated by large scale problems in urban transportation and labor mobility where there is congestion for resources and uncertainty in movement. In such domains, even though the individual agents do not have an identity of their own and do not explicitly interact with other agents, they effect other agents. While there has been much research in handling such implicit effects, it has primarily assumed deterministic movements of agents. We address the issue of decision support for individual agents that are identical and have involuntary movements in dynamic environments. For instance, in a taxi fleet serving a city, …


An Analysis Of Extreme Price Shocks And Illiquidity Among Trend Followers, Bernard Lee, Shih-Fen Cheng, Annie Koh May 2013

An Analysis Of Extreme Price Shocks And Illiquidity Among Trend Followers, Bernard Lee, Shih-Fen Cheng, Annie Koh

Shih-Fen CHENG

We construct an agent-based model to study the interplay between extreme price shocks and illiquidity in the presence of systematic traders known as trend followers. The agent-based approach is particularly attractive in modeling commodity markets because the approach allows for the explicit modeling of production, capacities, and storage constraints. Our study begins by using the price stream from a market simulation involving human participants and studies the behavior of various trend-following strategies, assuming initially that their participation will not impact the market. We notice an incremental deterioration in strategy performance as and when strategies deviate further and further from the …


A Mechanism For Organizing Last-Mile Service Using Non-Dedicated Fleet, Shih-Fen Cheng, Duc Thien Nguyen, Hoong Chuin Lau May 2013

A Mechanism For Organizing Last-Mile Service Using Non-Dedicated Fleet, Shih-Fen Cheng, Duc Thien Nguyen, Hoong Chuin Lau

Shih-Fen CHENG

Unprecedented pace of urbanization and rising income levels have fueled the growth of car ownership in almost all newly formed megacities. Such growth has congested the limited road space and significantly affected the quality of life in these megacities. Convincing residents to give up their cars and use public transport is the most effective way in reducing congestion; however, even with sufficient public transport capacity, the lack of last-mile (from the transport hub to the destination) travel services is the major deterrent for the adoption of public transport. Due to the dynamic nature of such travel demands, fixed-size fleets will …


An Agent-Based Commodity Trading Simulation, Shih-Fen Cheng, Yee Pin Lim May 2013

An Agent-Based Commodity Trading Simulation, Shih-Fen Cheng, Yee Pin Lim

Shih-Fen CHENG

In this paper, an event-centric commodity trading simulation powered by the multiagent framework is presented. The purpose of this simulation platform is for training novice traders. The simulation is progressed by announcing news events that affect various aspects of the commodity supply chain. Upon receiving these events, market agents that play the roles of producers, consumers, and speculators would adjust their views on the market and act accordingly. Their actions would be based on their roles and also their private information, and collectively they shape the market dynamics. This simulation has been effectively deployed for several training sessions. We will …


Iterated Weaker-Than-Weak Dominance, Shih-Fen Cheng, Michael P. Wellman May 2013

Iterated Weaker-Than-Weak Dominance, Shih-Fen Cheng, Michael P. Wellman

Shih-Fen CHENG

We introduce a weakening of standard gametheoretic δ-dominance conditions, called dominance, which enables more aggressive pruning of candidate strategies at the cost of solution accuracy. Equilibria of a game obtained by eliminating a δ-dominated strategy are guaranteed to be approximate equilibria of the original game, with degree of approximation bounded by the dominance parameter. We can apply elimination of δ-dominated strategies iteratively, but the for which a strategy may be eliminated depends on prior eliminations. We discuss implications of this order independence, and propose greedy heuristics for determining a sequence of eliminations to reduce the game as far as possible …


Multi-Period Combinatorial Auction Mechanism For Distributed Resource Allocation And Scheduling, Hoong Chuin Lau, Shih-Fen Cheng, Thin Yin Leong, Jong Han Park, Zhengyi Zhao May 2013

Multi-Period Combinatorial Auction Mechanism For Distributed Resource Allocation And Scheduling, Hoong Chuin Lau, Shih-Fen Cheng, Thin Yin Leong, Jong Han Park, Zhengyi Zhao

Shih-Fen CHENG

We consider the problem of resource allocation and scheduling where information and decisions are decentralized, and our goal is to propose a market mechanism that allows resources from a central resource pool to be allocated to distributed decision makers (agents) that seek to optimize their respective scheduling goals. We propose a generic combinatorial auction mechanism that allows agents to competitively bid for the resources needed in a multi-period setting, regardless of the respective scheduling problem faced by the agent, and show how agents can design optimal bidding strategies to respond to price adjustment strategies from the auctioneer. We apply our …


From Cyber Terrorism To State Actors’ Covert Cyber Operations, Jan Kallberg, Bhavani Thuraisingham Mar 2013

From Cyber Terrorism To State Actors’ Covert Cyber Operations, Jan Kallberg, Bhavani Thuraisingham

Jan Kallberg

Historically, since the Internet started to become a common feature in our lives, hackers have been seen as a major threat. This view has repeatedly been entrenched and distributed by media coverage and commentaries through the years. Instead the first twenty year of the Internet was acceptably secure, due to the limited abilities of the attackers, compared to the threat generated from a militarized Internet with state actors conducting cyber operations. In reality, the Internet have a reversed trajectory for its security where it has become more unsafe over time and moved from a threat to the individual to a …


Nuclear Deterrence In A Second Obama Term, Adam Lowther, Jan Kallberg Mar 2013

Nuclear Deterrence In A Second Obama Term, Adam Lowther, Jan Kallberg

Jan Kallberg

In the months prior to the 2012 presidential election in the United States, members of the Obama administration and sympathetic organizations inside the Beltway began floating the idea that the administration would pursue – after an Obama victory – further reductions in the US nuclear arsenal. With the ink still wet on the New ST ART Treaty, efforts to reduce the American arsenal to 1000 operationally deployed strategic nuclear weapons or, as some suggest, 500, is certainly premature. These efforts illustrate a poor understanding of nuclear deterrence theory and practice and the ramifications of a United States that lacks a …


Securing Access To Lower-Cost Talent Globally: The Dynamics Of Active Embedding And Field Structuration, Stephan Manning, Joerg Sydow, Arnold Windeler Mar 2013

Securing Access To Lower-Cost Talent Globally: The Dynamics Of Active Embedding And Field Structuration, Stephan Manning, Joerg Sydow, Arnold Windeler

Stephan Manning

This article examines how multinational corporations (MNCs) shape institutional conditions in emerging economies to secure access to high-skilled, yet lower-cost science and engineering talent. Based on two in-depth case studies of engineering offshoring projects of German automotive suppliers in Romania and China we analyze how MNCs engage in ‘active embedding’ by aligning local institutional conditions with global offshoring strategies and operational needs. MNCs thereby contribute to the structuration of field relations and practices of sourcing knowledge-intensive work from globally dispersed locations.Our findings stress the importance of institutional processes across geographic boundaries that regulate and get shaped by MNC activities.


Offensive Cyber: Superiority Or Stuck In Legal Hurdles?, Jan Kallberg Feb 2013

Offensive Cyber: Superiority Or Stuck In Legal Hurdles?, Jan Kallberg

Jan Kallberg

In recent years, offensive cyber operations have attracted significant interest from the non-Defense Department academic legal community, prompting numerous articles seeking to create a legal theory for cyber conflicts. Naturally, cyber operations should be used in an ethical way, but the hurdles generated by the legal community are staggering. At a time when the United States has already lost an estimated $4 trillion in intellectual property as a result of foreign cyber espionage, not to mention the loss of military advantage, focusing on what the United States cannot do in cyberspace only hinders efforts to defend the country from future …


Climate Change Adaptation Chapter: Marshfield, Massachusetts, Joshua H. Chase, Jonathan G. Cooper, Rory Elizabeth Fitzgerald, Filipe Antunes Lima, Sally R. Miller, Toni Marie Pignatelli Feb 2013

Climate Change Adaptation Chapter: Marshfield, Massachusetts, Joshua H. Chase, Jonathan G. Cooper, Rory Elizabeth Fitzgerald, Filipe Antunes Lima, Sally R. Miller, Toni Marie Pignatelli

Sally Miller

Climate change, understood as a statistically significant variation in the mean state of the climate or its variability, is the greatest environmental challenge of this generation (Intergovernmental Panel on Climate Change, 2001). Marshfield is already being affected by changes in the climate that will have a profound effect on the town’s economy, public health, coastal resources, natural features, water systems, and public and private infrastructure. Adaptation strategies have been widely recognized as playing an important role in improving a community’s ability to respond to climate stressors by resisting damage and recovering quickly. Based on review of climate projections for the …


An Empirical Investigation Of Entrepreneurship Intensity In Iranian State Universities, Behin Elahi Jan 2013

An Empirical Investigation Of Entrepreneurship Intensity In Iranian State Universities, Behin Elahi

Behin Elahi

The purpose of this study is to propose a framework to evaluate the entrepreneurship intensity (EI) of Iranian state universities. In order to determine EI, a hybrid multimethod framework consisting of Delphi, Analytic Network Process (ANP), and VIKOR is proposed. The Delphi method is used to localize and reduce the number of criteria extracted from a deep literature review, according to the social and economic conditions of Iranian state universities by using an expert panel, including sixty-eight country-wide academicians and practitioners. After that, a group approach to ANP was utilized as an evaluation method to derive the weights of each …


Wie Featured Person Of The Month Highlights (Katina Michael), Keyana Tenant, Katina Michael Jan 2013

Wie Featured Person Of The Month Highlights (Katina Michael), Keyana Tenant, Katina Michael

Professor Katina Michael

The WIE Featured Person of the Month is Katina Michael, editor-in-chief of IEEE Technology and Society Magazine. After working at OTIS Elevator Company and Andersen Consulting, Katina was offered and exciting graduate engineering position at Nortel in 1996; and her career has been fast track from there. Read Katina’s story on Page 7.


Natural Disasters And Early Warning Systems In Australia, Emma Papaemanuel, Katina Michael, Peter Johnston Jan 2013

Natural Disasters And Early Warning Systems In Australia, Emma Papaemanuel, Katina Michael, Peter Johnston

Professor Katina Michael

Australia's national emergency warning system alerts. Radio program in Greek.


Are Disaster Early Warnings Effective?, Kerri Worthington, Katina Michael, Peter Johnson, Paul Barnes Jan 2013

Are Disaster Early Warnings Effective?, Kerri Worthington, Katina Michael, Peter Johnson, Paul Barnes

Professor Katina Michael

Australia's summer is traditionally a time of heightened preparation for natural disasters, with cyclones and floods menacing the north and bushfires a constant threat in the south. And the prospect of more frequent, and more intense, disasters thanks to climate change has brought the need for an effective early warning system to the forefront of policy-making. Technological advances and improved telecommunication systems have raised expectations that warning of disasters will come early enough to keep people safe. But are those expectations too high? Kerri Worthington reports. Increasingly, the world's governments -- and their citizens -- rely on technology-based early warning …