Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 37

Full-Text Articles in Business

Competition In Modular Clusters, Carliss Y. Baldwin, C. Jason Woodard Dec 2007

Competition In Modular Clusters, Carliss Y. Baldwin, C. Jason Woodard

Research Collection School Of Computing and Information Systems

The last twenty years have witnessed the rise of disaggregated “clusters,” “networks,” or “ecosystems” of firms. In these clusters the activities of R&D, product design, production, distribution, and system integration may be split up among hundreds or even thousands of firms. Different firms will design and produce the different components of a complex artifact (like the processor, peripherals, and software of a computer system), and different firms will specialize in different stages of a complex production process. This paper considers the pricing behavior and profitability of these so-called modular clusters. In particular, we investigate a possibility hinted at in prior …


A Unified Interdisciplinary Theory Of Open Source Culture And Entertainment, Jerald Hughes, Karl Reiner Lang, Eric K. Clemons, Robert J. Kauffman Dec 2007

A Unified Interdisciplinary Theory Of Open Source Culture And Entertainment, Jerald Hughes, Karl Reiner Lang, Eric K. Clemons, Robert J. Kauffman

Research Collection School Of Computing and Information Systems

Digital technologies are profoundly transforming the production and consumption of culture and entertainment products. The emerging digital re-mix culture is an open source approach where content products in the arts and entertainment industries are increasingly rearranged, manipulated, and extended in the process of creating new works. This article offers a unified description of the tools and techniques that led to the development of the open source culture and that enable the processes which promote re-use of previously recorded materials. It then lays out the incentives and forces that either promote or inhibit the development, distribution, and consumption of modified cultural …


Multi-Period Combinatorial Auction Mechanism For Distributed Resource Allocation And Scheduling, Hoong Chuin Lau, Shih-Fen Cheng, Thin Yin Leong, Jong Han Park, Zhengyi Zhao Nov 2007

Multi-Period Combinatorial Auction Mechanism For Distributed Resource Allocation And Scheduling, Hoong Chuin Lau, Shih-Fen Cheng, Thin Yin Leong, Jong Han Park, Zhengyi Zhao

Research Collection School Of Computing and Information Systems

We consider the problem of resource allocation and scheduling where information and decisions are decentralized, and our goal is to propose a market mechanism that allows resources from a central resource pool to be allocated to distributed decision makers (agents) that seek to optimize their respective scheduling goals. We propose a generic combinatorial auction mechanism that allows agents to competitively bid for the resources needed in a multi-period setting, regardless of the respective scheduling problem faced by the agent, and show how agents can design optimal bidding strategies to respond to price adjustment strategies from the auctioneer. We apply our …


The Price Of Stability In Selfish Scheduling Games, Lucas Agussurja, Hoong Chuin Lau Nov 2007

The Price Of Stability In Selfish Scheduling Games, Lucas Agussurja, Hoong Chuin Lau

Research Collection School Of Computing and Information Systems

Game theory has gained popularity as an approach to analysing and understanding distributed systems with selfinterested agents. Central to game theory is the concept of Nash equilibrium as a stable state (solution) of the system, which comes with a price - the loss in efficiency. The quantification of the efficiency loss is one of the main research concerns. In this paper, we study the quality and computational characteristic of the best Nash equilibrium in two selfish scheduling models: the congestion model and the sequencing model. In particular, we present the following results: (1) In the congestion model: first, the best …


Modeling Semantics In Composite Web Service Requests By Utility Elicitation, Qianhui Althea Liang, Jen Yao Chung, Steven M. Miller Nov 2007

Modeling Semantics In Composite Web Service Requests By Utility Elicitation, Qianhui Althea Liang, Jen Yao Chung, Steven M. Miller

Research Collection School Of Computing and Information Systems

When meeting the challenges in automatic and semi-automatic Web service composition, capturing the user’s service demand and preferences is as important as knowing what the services can do. This paper discusses the idea of semantic service requests for composite services, and presents a multi-attribute utility theory (MAUT) based model of composite service requests. Service requests are modeled as user preferences and constraints. Two preference structures, additive independence and generalized additive independence, are utilized in calculating the expected utilities of service composition outcomes. The model is also based on an iterative and incremental scheme meant to better capture requirements in accordance …


An Information-Sharing Based Anti-Phishing System, Yueqing Cheng, Zhen Yuan, Lei Ma, Robert H. Deng Nov 2007

An Information-Sharing Based Anti-Phishing System, Yueqing Cheng, Zhen Yuan, Lei Ma, Robert H. Deng

Research Collection School Of Computing and Information Systems

This paper presents the design of an informationsharing based or server-assisted anti-phishing system. The system follows a client-server architecture and makes decision based on not only client side heuristics but also collective information from multiple clients. When visiting a web site, a client side proxy, installed as a plug-in to a browser, decides on the legitimacy of the web site based on a combination of white list, black list and heuristics. In case the client side proxy does not have sufficient information to make a clear judgment, it reports the suspicious site to a central server which has access to …


Designing The Market Game For A Commodity Trading Simulation, Shih-Fen Cheng Nov 2007

Designing The Market Game For A Commodity Trading Simulation, Shih-Fen Cheng

Research Collection School Of Computing and Information Systems

In this paper, we propose to design a market game that (a) can be used in modeling and studying commodity trading scenarios, and (b) can be used in capturing human traders' behaviors. Specifically, we demonstrate the usefulness of this commodity trading game in a single-commodity futures trading scenario. A pilot experiment was run with a mixture of human traders and an autonomous agent that emulates the aggregatedmarket condition, with the assumption that this autonomous agent would hint each of its action through a public announcement. We show that the information collected from this simulation can be used to extract the …


Follow The Leader? Price Change Timing In Internet-Based Selling, R. J. Kauffman, Charles A. Wood Oct 2007

Follow The Leader? Price Change Timing In Internet-Based Selling, R. J. Kauffman, Charles A. Wood

Research Collection School Of Computing and Information Systems

Internet technologies should lessen information asymmetry, prompting competitive price reactions, but this does not seem to be happening in Internet-based selling. We study empirical regularities of price change timing for music CD vendors and booksellers to assess several theoretical explanations. Our sample includes 123, 680 daily prices for 169 products and 53 firms. Bertrand competition is insufficient to explain our observation that sellers do not shift prices this way. Tacitly collusive responses to competitors' price changes are observed rather than price changes solely in response to demand or cost shifts as would be expected with Bertrand competition. We find evidence …


When The Rumour Strikes..., M. Thulasidas Oct 2007

When The Rumour Strikes..., M. Thulasidas

Research Collection School Of Computing and Information Systems

Managers should make use of the underground rumour mill to understand employee concerns. EMPLOYEES seek insights into where their organisation is heading. And they should, because what their organisation does has a direct impact on their well- being.


Differentiating Knowledge Processes In Organisational Learning: A Case Of ‘Two Solitudes’, Siu Loon Hoe, Steven L. Mcshane Oct 2007

Differentiating Knowledge Processes In Organisational Learning: A Case Of ‘Two Solitudes’, Siu Loon Hoe, Steven L. Mcshane

Research Collection School Of Computing and Information Systems

The fields of organizational behaviour (OB)/strategy and marketing have taken different paths over the past two decades to understanding organisational learning. OB/strategy has been pre-occupied with theory development and case study illustrations, whereas marketing research has taken a highly quantitative path. Although relying on essentially the same foundation theory, these two solitudes have had minimal cross-fertilisation. Furthermore, both fields tend to blur or usually ignore the distinction between structural and informal knowledge processes. The marketing literature, in particular, relies on the MARKOR scale, which measures structural knowledge processes. Informal knowledge acquisition and dissemination processes are almost completely ignored. The purpose …


Preserving Privacy In Supply Chain Management: A Challenge For Next Generation Data Mining, Madhu Ahluwalia, Zhiyuan Chen, Arrya Gangopadhyay, Zhiling Guo Oct 2007

Preserving Privacy In Supply Chain Management: A Challenge For Next Generation Data Mining, Madhu Ahluwalia, Zhiyuan Chen, Arrya Gangopadhyay, Zhiling Guo

Research Collection School Of Computing and Information Systems

In this paper we identify a major area of research as a topic for next generation data mining. The research effort in the last decade on privacy preserving data mining has resulted in the development of numerous algorithms. However, most of the existing research has not been applied in any particular application context. Hence it is unclear whether the current algorithms are directly applicable in any particular problem context. In this paper we identify a significant application context that not only requires protection of privacy but also sophisticated data analysis. The area in question is supply chain management, arguably one …


The Office Killjoy, M. Thulasidas Oct 2007

The Office Killjoy, M. Thulasidas

Research Collection School Of Computing and Information Systems

If you think stress makes you more productive, then you need to change. HOW can we manage stress, given that it is unavoidable in our corporate existence?


Analyzing Service Usage Patterns: Methodology And Simulation, Qianhui (Althea) Liang, Jen-Yao Chung Oct 2007

Analyzing Service Usage Patterns: Methodology And Simulation, Qianhui (Althea) Liang, Jen-Yao Chung

Research Collection School Of Computing and Information Systems

This paper proposes that service mining technology will power the construction of new business services via both intra- and inter-enterprise service assembly within the Service Oriented Architecture (SOA) framework. We investigate the methodologies of service mining at the component level of service usage. We also demonstrate how mining of service usage patterns is intended to be used to improve different aspects of service composition. Simulation experiments conducted for mining at the component level are analyzed. The processing details within a general service mining deployment are demonstrated.


Robust Local Search And Its Application To Generating Robust Schedules, Hoong Chuin Lau, Fei Xiao, Thomas Ou Sep 2007

Robust Local Search And Its Application To Generating Robust Schedules, Hoong Chuin Lau, Fei Xiao, Thomas Ou

Research Collection School Of Computing and Information Systems

In this paper, we propose an extended local search framework to solve combinatorial optimization problems with data uncertainty. Our approach represents a major departure from scenario-based or stochastic programming approaches often used to tackle uncertainty. Given a value 0 < ? 1, we are interested to know what the robust objective value is, i.e. the optimal value if we allow an chance of not meeting it, assuming that certain data values are defined on bounded random variables. We show how a standard local search or metaheuristic routine can be extended to efficiently construct a decision rule with such guarantee, albeit heuristically. We demonstrate its practical applicability on the Resource Constrained Project Scheduling Problem with minimal and maximal time lags (RCPSP/max) taking into consideration activity duration uncertainty. Experiments show that, partial order schedules can be constructed that are robust in our sense without the need for a large planned horizon (due date), which improves upon the work proposed by Policella et al. 2004.


Insults In Your Inbox, M. Thulasidas Sep 2007

Insults In Your Inbox, M. Thulasidas

Research Collection School Of Computing and Information Systems

Email is a boon at work, but aggressive staff may use it to inflict humiliation. Most of its impact has been positive. An email from the big boss to all@yourcompany, for instance, is a fair substitute for a general communication meet- ing. In smaller teams, email often saves meetings and increases productivity.


Keep The Talk Flowing, M. Thulasidas Sep 2007

Keep The Talk Flowing, M. Thulasidas

Research Collection School Of Computing and Information Systems

Specialisation is good. It lets us go deep into a specific field of endeavour, but at the expense of a broad overview of everything.


Innovation Stack - Choosing Innovations For Commercialization, Arcot Desai Narasimhalu Aug 2007

Innovation Stack - Choosing Innovations For Commercialization, Arcot Desai Narasimhalu

Research Collection School Of Computing and Information Systems

This paper describes a method for enterprises to order the innovations of interest according to a number of parameters including their own business strategy and core competencies. The method takes into account aspects such as ability to create entry barriers and complementary assets. Enterprises can now use this method to both filter out innovations that may not be of interest to them and then order the short listed or selected innovations according to their attractiveness.


Designing The Value Curve For Your Next Innovation, Arcot Desai Narasimhalu Aug 2007

Designing The Value Curve For Your Next Innovation, Arcot Desai Narasimhalu

Research Collection School Of Computing and Information Systems

This paper introduces an additional feature to the strategy canvas and value curve that will make innovation designers more effective. The new feature is to let the innovators carry out the designs of their new innovations taking into account both the cost of improving the quality of a parameter that the users value highly and the savings accrued from the drop in provisioning for parameters that users place less emphasis in an innovation.


Mapping Better Business Strategies With Gis, Tin Seong Kam Aug 2007

Mapping Better Business Strategies With Gis, Tin Seong Kam

Research Collection School Of Computing and Information Systems

The value of location as a business measure is fast becoming an important consideration for organisations. GIS (Geographical Information Systems), with its capability to manage, display, analyse business information spatially, is emerging as a powerful location intelligence tool. In the US, Starbucks, Blockbuster, Hyundai, and thousands of other businesses use census data and GIS software to help them understand what types of people buy their products and services, and how to better market to these consumers. For example, McDonald’s in Japan uses a GIS system to overlay demographic information on maps to help identify promising new store sites. Singapore Management …


Where Work And Death Meet, M. Thulasidas Aug 2007

Where Work And Death Meet, M. Thulasidas

Research Collection School Of Computing and Information Systems

STRESS is as much a part of our cor- porate careers as death is a fact of life. Still, it is best to keep the two (career and death) separate. This message is lost on some hardworking souls here who literally work themselves to death.


Re-Engineering Xid Technologies - From Enterprise To Consumer Markets, Arcot Desai Narasimhalu Aug 2007

Re-Engineering Xid Technologies - From Enterprise To Consumer Markets, Arcot Desai Narasimhalu

Research Collection School Of Computing and Information Systems

Several studies have addressed the process of taking ideas to markets but few have shared the experiences of start up companies that have reexamined their product strategies and repositioned their products and services for better revenues and profits. This paper reports the efforts related to repositioning of XID technologies, a start up company, into new markets while continuing to exploit its core technical competencies.


Organisational Learning: Conceptual Links To Individual Learning, Learning Organisation And Knowledge Management, Siu Loon Hoe Jul 2007

Organisational Learning: Conceptual Links To Individual Learning, Learning Organisation And Knowledge Management, Siu Loon Hoe

Research Collection School Of Computing and Information Systems

Organisational learning has over the years been subject of much study by scholars and managers. In the process, the organisational learning concept has been linked to many other knowledge concepts such as individual learning, learning organisation, and knowledge management. This paper draws from existing literature in organisational behaviour, human resource management, marketing, and information management, to further develop the conceptual links between organisational learning and these knowledge concepts. The paper discusses the characteristics of organisational learning and emphasises its link to individual learning, the learning organisation, and knowledge management. It contributes to the conceptual and theoretical understanding of organisational learning …


They Want To Talk, But Are They Listening?, M. Thulasidas Jul 2007

They Want To Talk, But Are They Listening?, M. Thulasidas

Research Collection School Of Computing and Information Systems

Every relationship could use a little less action, a little more conversation.


Generating Job Schedules For Vessel Operations In A Container Terminal, Thin Yin Leong, Hoong Chuin Lau Jul 2007

Generating Job Schedules For Vessel Operations In A Container Terminal, Thin Yin Leong, Hoong Chuin Lau

Research Collection School Of Computing and Information Systems

No abstract provided.


It's Not So Hard To Say Goodbye, M. Thulasidas Jul 2007

It's Not So Hard To Say Goodbye, M. Thulasidas

Research Collection School Of Computing and Information Systems

Staff retention is a major problem in the job market here. Our economy is doing well; our job market is red hot. As a result, new job offers are becoming more irresistible. At some stage, someone you work closely with — be it your staff, your boss or a fellow team member — is going to hand in that dreaded letter to the human resource (HR) department. Handling resignations with tact and grace is no longer merely a desirable quality, but an essential corporate skill today.


Shared Vision: A Development Tool For Organisational Learning, Siu Loon Hoe Jul 2007

Shared Vision: A Development Tool For Organisational Learning, Siu Loon Hoe

Research Collection School Of Computing and Information Systems

PurposeThe organizational behavior and management literature has devoted a lot attention to processes and technology in organizational learning. There has been little work to examine the effect of shared vision on organizational learning. The purpose of this paper is to highlight the importance of shared vision as a development tool to build an organizational learning capability.Design/methodology/approachThe existing shared vision and organizational learning literature was reviewed, and the salient points on how shared vision promotes organizational learning discussed.Practical implicationsThe paper offers a view on how leaders can use shared vision to develop organizational learning capability. Practicing managers would then be able …


Is Interpersonal Trust A Necessary Condition For Organisational Learning?, Siu Loon Hoe Jul 2007

Is Interpersonal Trust A Necessary Condition For Organisational Learning?, Siu Loon Hoe

Research Collection School Of Computing and Information Systems

The organisational behaviour and management literature has devoted a lot attention on various factors affecting organisational learning. While there has been much work done to examine trust in promoting organisational learning, there is a lack of consensus on the specific type of trust involved. The purpose of this paper is to highlight the importance of interpersonal trust in promoting organisational learning and propose a research agenda to test the extent of interpersonal trust on organisational learning. This paper contributes to the existing organisational learning literature by specifying a specific form of trust, interpersonal trust, which promotes organisational learning and proposing …


Improving Memory-Based Collaborative Filtering Using A Factor-Based Approach, Zhenxue Zhang, Dongsong Zhang, Zhiling Guo Jul 2007

Improving Memory-Based Collaborative Filtering Using A Factor-Based Approach, Zhenxue Zhang, Dongsong Zhang, Zhiling Guo

Research Collection School Of Computing and Information Systems

Collaborative Filtering (CF) systems generate recommendations for a user by aggregating item ratings of other like-minded users. The memory-based approach is a common technique used in CF. This approach first uses statistical methods such as Pearson’s Correlation Coefficient to measure user similarities based on their previous ratings on different items. Users will then be grouped into different neighborhood depending on the calculated similarities. Finally, the system will generate predictions on how a user would rate a specific item by aggregating ratings on the item cast by the identified neighbors of his/her. However, current memory-based CF method only measures user similarities …


The Business Model Of "Software-As-A-Service", Dan Ma Jul 2007

The Business Model Of "Software-As-A-Service", Dan Ma

Research Collection School Of Computing and Information Systems

The emergence of the software-as-a-service (SaaS) business model has attracted great attentions from both researchers and practitioners. SaaS vendors deliver on-demand information processing services to users, and thus offer computing utility rather than the standalone software itself. In this work, the author propose an analytical model to study the competition between the SaaS and the traditional COTS (commercial off-the-shelf) solutions for software applications. The author show that when software applications become open, modulated, and standardized, the SaaS business model will take a significant market share. In addition, under certain market conditions, offering users an easy exit option through the software …


Making The ‘Most’ Out Of Rfid Technology: A Research Agenda For The Study Of The Adoption, Use And Impact Of Rfid, John Curtin, Robert J. Kauffman, Frederick J. Riggins Jun 2007

Making The ‘Most’ Out Of Rfid Technology: A Research Agenda For The Study Of The Adoption, Use And Impact Of Rfid, John Curtin, Robert J. Kauffman, Frederick J. Riggins

Research Collection School Of Computing and Information Systems

Radio frequency identification (RFID) technology dramatically increases the ability of the organization to acquire a vast array of data about the location and properties of any entity that can be physically tagged and wirelessly scanned within certain technical limitations. RFID can be applied to a variety of tasks, structures, work systems and contexts along the value chain, including business-to-business logistics, internal operations, business-to-consumer marketing, and after-sales service applications. As industry adoption of RFID increases there is an emerging interest by academic researchers to engage in scholarly investigation to understand how RFID relates to mobility, organizational and systems technologies (MOST). In …