Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

Series

Physical Sciences and Mathematics

2011

Institution
Keyword
Publication
File Type

Articles 1 - 30 of 97

Full-Text Articles in Business

User Choice Between Traditional And Computerized Methods: An Activity Perspective, Jun Sun Dec 2011

User Choice Between Traditional And Computerized Methods: An Activity Perspective, Jun Sun

Information Systems Faculty Publications and Presentations

Numerous computerized methods emerge to replace traditional methods in people’s personal, work and social lives, but many are hesitant to make the transition. This study examines the factors that influence human choice between different methods. According to Activity Theory, traditional and computerized methods are both tools that a person uses for a certain task. The situated experiences with various methods shape people’s attitude toward using them later in terms of tool readiness. The understanding leads to hypothesized relationships between user-, method- and task-specific factors and the dependent variable. The results from an empirical study support that method experiences have strong …


New Theories And Methods For Technology Adoption Research, Robert J. Kauffman, Angsana A. Techatassanasoontorn Dec 2011

New Theories And Methods For Technology Adoption Research, Robert J. Kauffman, Angsana A. Techatassanasoontorn

Research Collection School Of Computing and Information Systems

This special issue includes six articles on different aspects of technology adoption that represent the development and application of different theoretical and methodological approaches to the business problems that they treat. In terms of theory, three of the articles use behavioral and organizational theories, including adaptive structuration theory, management fashion theory, the unified theory of technology acceptance, the technology acceptance model, and diffusion of innovation theory. The other two are based on economic theory, including network effects theory, and economic growth theory. The methods used are also dramatically different in each of the studies. Three studies use field research and …


From Primordial Soup To Platform-Based Competition: Exploring The Emergence Of Products, Systems, And Platforms, C. Jason Woodard, Eric K. Clemons Dec 2011

From Primordial Soup To Platform-Based Competition: Exploring The Emergence Of Products, Systems, And Platforms, C. Jason Woodard, Eric K. Clemons

Research Collection School Of Computing and Information Systems

We use an agent-based NK model to explore the conditions under which standard platforms emerge among competing products. Our findings were inconclusive. We find that the usual Darwinian conditions needed for the emergence of complexity are sufficient to yield a limited reliance upon platforms with a core of common components, simply because evolution causes the population to converge on a set of products that contain combinations that "work well," yielding what we call "coincidental platform emergence." Economies of scale yield more use of common components, or "production platform emergence." Positive participation externalities initially induce the highest degree of platform emergence …


Value Relevance Of Blog Visibility, Nan Hu, Ling Liu, Arindam Tripathy, Lee J. Yao Dec 2011

Value Relevance Of Blog Visibility, Nan Hu, Ling Liu, Arindam Tripathy, Lee J. Yao

Research Collection School Of Computing and Information Systems

This study empirically examines the effect of a non-traditional information source, namely a firm's blog visibility on the capital market valuation of firms. After controlling for earnings, book value of equity and other value relevant variables, such as traditional media exposure, R&D spending, and advertising expense, we find a positive association between a firm's blog visibility and its capital market valuation. In addition, we find blog visibility Grange causes trading, not vice versa. Our findings indicate that non-traditional information sources such as blogs help disseminate information and influence consumers' investment decisions by capturing their attention.


Four Perspectives On Architectural Strategy, C. Jason Woodard, Joel West Dec 2011

Four Perspectives On Architectural Strategy, C. Jason Woodard, Joel West

Research Collection School Of Computing and Information Systems

A recurring theme in the literature on technology and organizations is the concept of mirroring, which posits a duality between technological and organizational design decisions. In this paper we highlight a second, orthogonal duality between components and interfaces: designers of both products and organizations must decide what information to hide within component boundaries and what to expose to other designers. Although the component-interface duality appears in many settings, it presents especially vexing strategic challenges in the design and production of complex digital artifacts. We present a typology of four interlinked perspectives on these kinds of strategic design problems, and discuss …


Content Contribution Under Revenue Sharing And Reputation Concern In Social Media: The Case Of Youtube, Qian Tang, Bin Gu, Andrew B. Whinston Dec 2011

Content Contribution Under Revenue Sharing And Reputation Concern In Social Media: The Case Of Youtube, Qian Tang, Bin Gu, Andrew B. Whinston

Research Collection School Of Computing and Information Systems

A key feature of social media is that it allows individuals and businesses to contribute contents for public viewing. However, little is known about how content providers derive payoffs from such activities. In this study, we build a dynamic structural model to recover the utility function for content providers. Our model distinguishes short-term payoffs based on ad revenue sharing from long-term payoffs driven by content providers’ reputation. The model was estimated using a panel data of 914 top 1000 providers and 381 randomly selected providers on YouTube from Jun 7th, 2010, to Aug 7th, 2011. The two different sets of …


Assessing The Impact Of Recommendation Agents On On-Line Consumer Unplanned Purchase Behavior, R. Eric Hostler, Victoria Y. Yoon, Zhiling Guo, Tor Guimaraes, Guisseppi Forgionne Dec 2011

Assessing The Impact Of Recommendation Agents On On-Line Consumer Unplanned Purchase Behavior, R. Eric Hostler, Victoria Y. Yoon, Zhiling Guo, Tor Guimaraes, Guisseppi Forgionne

Research Collection School Of Computing and Information Systems

Recommendation agents (RAs) have been used by many Internet businesses such as Amazon and Netflix. However, few authors have studied how consumer behavior is affected by those that make suggestions to online consumers based on their recent shopping behavior. Fewer still have examined the role that RAs play in influencing impulse purchasing decisions online. Our study developed a theoretical model to illustrate the impact of RAs on online consumer behavior. The model was tested through an online shopping simulation which used a collaborative filtering based product RA. Particular attention was paid to the effects of an RA on consumer behavior; …


Agile Innovation Management, Arcot Desai Narasimhalu Nov 2011

Agile Innovation Management, Arcot Desai Narasimhalu

Research Collection School Of Computing and Information Systems

The volume and velocity of innovations are on the increase resulting in increased pressures on every company for attaining, retaining and increasing its market leadership. Many companies need to retool their innovation management processes to address two agility related objectives in order to survive and grow in such a rapidly changing innovation environment. The first objective would be the ability to assemble an innovation team within the shortest possible time. This can only be satisfied by companies that are capable of forming innovation teams rather quickly. The related second objective would be to reduce the I2M (Idea to Market) cycle …


Reflections On The Journey: Six Short Stories, Sharon L. Haynie, Amber S. Hinkle, Nancy L. Jones, Cheryl A. Martin, Paula J. Olsiewski, Mary F. Roberts Nov 2011

Reflections On The Journey: Six Short Stories, Sharon L. Haynie, Amber S. Hinkle, Nancy L. Jones, Cheryl A. Martin, Paula J. Olsiewski, Mary F. Roberts

Integrated Science and Business Technology Faculty Work

One of the goals of the 2011 International Year of Chemistry is to celebrate the contributions of women to science. A question that has been frequently asked in this regard is... Why is it necessary to highlight women in the "age of equality"? The reasons are varied but the facts are that many women scientists worked in obscurity throughout the 19th and even well into the 20th century, sometimes publishing anonymously to be heard. This celebration of Women in Science is one way to recognize both the resiliency and passion of these women. As part of this celebration, Chemistry Central …


No Fear: Leadership, "Digital Cowboys" And The "Playstation Generation", Singapore Management University Nov 2011

No Fear: Leadership, "Digital Cowboys" And The "Playstation Generation", Singapore Management University

Perspectives@SMU

Finnish entrepreneur Pekka Viljakainen would be considered as successful by most measures. At only 38 years of age, he has managed a staff of 8,000 across 20 countries from Munich. His information technology (IT) consultancy, Oy Visual Systems, had merged with Tieto, another European IT firm, and Viljakainen was made executive vice-president.


Are There Contagion Effects In Information Technology And Business Process Outsourcing?, Arti Mann, Robert J. Kauffman, Kunsoo Han, Barrie R. Nault Nov 2011

Are There Contagion Effects In Information Technology And Business Process Outsourcing?, Arti Mann, Robert J. Kauffman, Kunsoo Han, Barrie R. Nault

Research Collection School Of Computing and Information Systems

We model the diffusion of IT outsourcing using announcements about IT outsourcing deals. We estimate a lognormal diffusion curve to test whether IT outsourcing follows a pure diffusion process or there are contagion effects involved. The methodology permits us to study the consequences of outsourcing events, especially mega-deals with IT contract amounts that exceed US$1 billion. Mega-deals act, we theorize, as precipitating events that create a strong basis for contagion effects and are likely to affect decision-making by other firms in an industry. Then, we evaluate the role of different communication channels in the diffusion process of IT outsourcing by …


Managing Successive Generation Product Diffusion In The Presence Of Strategic Consumers, Zhiling Guo Nov 2011

Managing Successive Generation Product Diffusion In The Presence Of Strategic Consumers, Zhiling Guo

Research Collection School Of Computing and Information Systems

Frequent new product release and technological uncertainty about the release time pose significant challenges for firms to manage successive generation of products. On the one hand, strategic consumers may delay their purchase decision and substitute the earlier generation with the newer generation product. On the other hand, the firm must fully anticipate consumer reactions and take into account the effect of their strategic behavior on product pricing and successive generation product diffusion. This paper proposes a prediction market to forecast new product release. We show that the market information aggregation mechanism can improve forecast accuracy of new product launch. Better …


Profit-Maximizing Firm Investments In Customer Information Security, Yong Yick Lee, Robert J. Kauffman, Ryan Sougstad Nov 2011

Profit-Maximizing Firm Investments In Customer Information Security, Yong Yick Lee, Robert J. Kauffman, Ryan Sougstad

Research Collection School Of Computing and Information Systems

When a customer interacts with a firm, extensive personal information often is gathered without the individual's knowledge. Significant risks are associated with handling this kind of information. Providing protection may reduce the risk of the loss and misuse of private information, but it imposes some costs on both the firm and its customers. Nevertheless, customer information security breaches still may occur. They have several distinguishing characteristics: (1) typically it is hard to quantify monetary damages related to them; (2) customer information security breaches may be caused by intentional attacks, as well as through unintentional organizational and customer behaviors; and (3) …


Price Points And Price Rigidity, Daniel Levy, Dongwon Lee, Haipeng (Allen) Lee, Robert J. Kauffman, Mark Bergen Nov 2011

Price Points And Price Rigidity, Daniel Levy, Dongwon Lee, Haipeng (Allen) Lee, Robert J. Kauffman, Mark Bergen

Research Collection School Of Computing and Information Systems

We study the link between price points and price rigidity using two data sets: weekly scanner data and Internet data. We find that ‘‘9’’ is the most frequent ending for the penny, dime, dollar, and ten-dollar digits; the most common price changes are those that keep the price endings at ‘‘9’’; 9-ending prices are less likely to change than non-9-ending prices; and the average size of price change is larger for 9-ending than non-9- ending prices. We conclude that 9-ending contributes to price rigidity from penny to dollar digits and across a wide range of product categories, retail formats, and …


2011 Scholars And Artists Bibliography, Michael Schwartz Library, Cleveland State University, Friends Of The Michael Schwartz Library, Mark Tebeau Oct 2011

2011 Scholars And Artists Bibliography, Michael Schwartz Library, Cleveland State University, Friends Of The Michael Schwartz Library, Mark Tebeau

Scholars and Artists Bibliographies

This bibliography was created for the annual Friends of the Michael Schwartz Library Scholars and Artists Reception, recognizing scholarly and creative achievements of Cleveland State University faculty, staff and emeriti. Mark Tebeau was the guest speaker


Depicting Estimates Using The Intercept In Meta-Regression Models: The Moving Constant Technique, Blair T. Johnson Dr., Tania B. Huedo-Medina Dr. Oct 2011

Depicting Estimates Using The Intercept In Meta-Regression Models: The Moving Constant Technique, Blair T. Johnson Dr., Tania B. Huedo-Medina Dr.

CHIP Documents

In any scientific discipline, the ability to portray research patterns graphically often aids greatly in interpreting a phenomenon. In part to depict phenomena, the statistics and capabilities of meta-analytic models have grown increasingly sophisticated. Accordingly, this article details how to move the constant in weighted meta-analysis regression models (viz. “meta-regression”) to illuminate the patterns in such models across a range of complexities. Although it is commonly ignored in practice, the constant (or intercept) in such models can be indispensible when it is not relegated to its usual static role. The moving constant technique makes possible estimates and confidence intervals at …


Identifying Social Influence In Networks Using Randomized Experiments, Sinan Aral, Dylan Walker Oct 2011

Identifying Social Influence In Networks Using Randomized Experiments, Sinan Aral, Dylan Walker

Business Faculty Articles and Research

The recent availability of massive amounts of networked data generated by email, instant messaging, mobile phone communications, micro blogs, and online social networks is enabling studies of population-level human interaction on scales orders of magnitude greater than what was previously possible.1'2 One important goal of applying statistical inference techniques to large networked datasets is to understand how behavioral contagions spread in human social networks. More precisely, understanding how people influence or are influenced by their peers can help us understand the ebb and flow of market trends, product adoption and diffusion, the spread of health behaviors such as smoking and …


Strategic Responses To Standardization: Embrace, Extend Or Extinguish?, C. Jason Woodard, Joel West Oct 2011

Strategic Responses To Standardization: Embrace, Extend Or Extinguish?, C. Jason Woodard, Joel West

Research Collection School Of Computing and Information Systems

Prior research on technology standardization has focused on two common patterns: processes in which product developers and other stakeholders cooperate to achieve a consensus outcome, and “standards wars” in which competing technologies vie for dominance in the market. This study examines Microsoft's responses to 12 software technologies in the period between 1990 and 2005. Despite the company's reputed tendency to pursue a strategy dubbed “embrace, extend, and extinguish,” a content analysis of news articles from the same period reveals surprising diversity in Microsoft's responses at the product level.

We classify these responses using a typology that treats “embrace” and “extend” …


Allocating Resources In Multiagent Flowshops With Adaptive Auctions, Hoong Chuin Lau, Zhengyi Zhao, Sam Shuzhi Ge, Thong Heng Lee Oct 2011

Allocating Resources In Multiagent Flowshops With Adaptive Auctions, Hoong Chuin Lau, Zhengyi Zhao, Sam Shuzhi Ge, Thong Heng Lee

Research Collection School Of Computing and Information Systems

In this paper, we consider the problem of allocating machine resources among multiple agents, each of which is responsible to solve a flowshop scheduling problem. We present an iterated combinatorial auction mechanism in which bid generation is performed within each agent, while a price adjustment procedure is performed by a centralized auctioneer. While this approach is fairly well-studied in the literature, our primary innovation is in an adaptive price adjustment procedure, utilizing variable step-size inspired by adaptive PID-control theory coupled with utility pricing inspired by classical microeconomics. We compare with the conventional price adjustment scheme proposed in Fisher (1985), and …


A Five-Year Management Strategy For The Recreational Trout Fishery, Department Of Fisheries Western Australia. Sep 2011

A Five-Year Management Strategy For The Recreational Trout Fishery, Department Of Fisheries Western Australia.

Fisheries management papers

The discussion paper for a five-year management strategy for the recreational trout fishery (Fisheries Management Paper No. 234) was released for public comment in September 2009. It attracted a moderate level of comment with 17 written submissions being received from a variety of stakeholders. The RFFSS considered these submissions and took into account the issues raised in developing the recommendations contained within this paper.


Interview With Jessica Beckett, Free Geek, 2011 (Audio), Jessica Beckett Aug 2011

Interview With Jessica Beckett, Free Geek, 2011 (Audio), Jessica Beckett

All Sustainability History Project Oral Histories

Interview of Jessica Beckett by Thomas Yarbrough at Free Geek Portland, Oregon on August 10th, 2011.

The interview index is available for download.


Interview With Christian Ettinger, Hopworks, 2011 (Audio), Christian Ettinger Aug 2011

Interview With Christian Ettinger, Hopworks, 2011 (Audio), Christian Ettinger

All Sustainability History Project Oral Histories

Interview of Christian Ettinger by Scott Demming at Hopworks SE Portland, Oregon on August 10th, 2011.

The interview index is available for download.


On The Acceleration Of Explicit Finite Difference Methods For Option Pricing, Stephen O'Sullivan, Conall O'Sullivan Aug 2011

On The Acceleration Of Explicit Finite Difference Methods For Option Pricing, Stephen O'Sullivan, Conall O'Sullivan

Articles

Implicit finite difference methods are conventionally preferred over their explicit counterparts for the numerical valuation of options. In large part the reason for this is a severe stability constraint known as the Courant–Friedrichs–Lewy (CFL) condition which limits the latter class’s efficiency. Implicit methods, however, are difficult to implement for all but the most simple of pricing models, whereas explicit techniques are easily adapted to complex problems. For the first time in a financial context, we present an acceleration technique, applicable to explicit finite difference schemes describing diffusive processes with symmetric evolution operators, called Super-Time-Stepping. We show that this method can …


Draft Management Plan For The Mackerel Managed Fishery., Department Of Fisheries Western Australia. Aug 2011

Draft Management Plan For The Mackerel Managed Fishery., Department Of Fisheries Western Australia.

Fisheries management papers

In accordance with section 64(2) of the Fish Resources Management Act 1994, the Minister for Fisheries has published a Notice in the Government Gazette on 19 August 2011 stating that he intends to determine a Management Plan for the Mackerel Managed Fishery and invites interested persons to comment on the Draft Plan.


Taxisim: A Multiagent Simulation Platform For Evaluating Taxi Fleet Operations, Shih-Fen Cheng, Thi Duong Nguyen Aug 2011

Taxisim: A Multiagent Simulation Platform For Evaluating Taxi Fleet Operations, Shih-Fen Cheng, Thi Duong Nguyen

Research Collection School Of Computing and Information Systems

Taxi service is an important mode of public transportation in most metropolitan areas since it provides door-to-door convenience in the public domain. Unfortunately, despite all the convenience taxis bring, taxi fleets are also extremely inefficient to the point that over 50% of its operation time could be spent in idling state. Improving taxi fleet operation is an extremely challenging problem, not just because of its scale, but also due to fact that taxi drivers are self-interested agents that cannot be controlled centrally. To facilitate the study of such complex and decentralized system, we propose to construct a multiagent simulation platform …


Evaluating And Implementing Web Scale Discovery Services: Part Two, Jason Vaughan, Tamera Hanken Jul 2011

Evaluating And Implementing Web Scale Discovery Services: Part Two, Jason Vaughan, Tamera Hanken

Library Faculty Presentations

Part Four: Quick Tour of the Current Marketplace:

  • "The Big 5"
  • Similarities and differences

Part Five: It's Not All Sliced Bread:

  • Shortcomings of web scale discovery

Part Six: Implementation (pre launch steps):

  • Selecting and preparing implementation staff
  • Preparing and communicating process/decisions with all staff
  • Working with the vendor (roles, expectations, timeline)
  • Workflow changes and implications (technical services)

Part Seven: Specific implementation tasks, issues, and considerations:

  • Record loading and mapping (catalog content)
  • Harvesting and mapping digital/local content
  • Working with central index data (internal & external content)
  • Web integration and customization
  • Assessment and continuous improvement


Evaluating And Implementing Web Scale Discovery Services: Part One, Jason Vaughan, Tamera Hanken Jul 2011

Evaluating And Implementing Web Scale Discovery Services: Part One, Jason Vaughan, Tamera Hanken

Library Faculty Presentations

Preface: Before Web Scale Discovery

  • A very brief overview

Part 1: What is Web Scale Discovery

  • Content
  • Technology

Part 2: Why is Web Scale Discovery important?

  • What’s the need?
  • How is it different from earlier attempts at broad discovery?

Part 3: A Framework for Evaluating Web Scale Discovery Services

  • What we did at UNLV
  • Other options




Walking Box Ranch Planning And Design Quarterly Progress Report: Period Ending July 10, 2010, Margaret N. Rees Jul 2011

Walking Box Ranch Planning And Design Quarterly Progress Report: Period Ending July 10, 2010, Margaret N. Rees

Walking Box Ranch

  • UNLV participated in several meetings with BLM regarding updating the current Task Order, obtaining a two-year no-cost extension for the two Assistance Agreements, and to develop the future WBR operating agreement between BLM and UNLV
  • UNLV met with Sara Moffatt, one of Senator Reid’s staff, to provide an update on project progress. UNLV also requested the Senator’s support in obtaining additional funding for the project for construction, and also for UNLV to bridge the transition from construction through the first two years of operation.
  • UNLV held several internal meetings to advance planning for a July VA meeting with BLM to …


A Study On Facility Planning Using Discrete Event Simulation: Case Study Of A Grain Delivery Terminal., Sarah M. Asio Jul 2011

A Study On Facility Planning Using Discrete Event Simulation: Case Study Of A Grain Delivery Terminal., Sarah M. Asio

Department of Industrial and Management Systems Engineering: Dissertations, Theses, and Student Research

The application of traditional approaches to the design of efficient facilities can be tedious and time consuming when uncertainty and a number of constraints exist. Queuing models and mathematical programming techniques are not able to capture the complex interaction between resources, the environment and space constraints for dynamic stochastic processes. In the following study discrete event simulation is applied to the facility planning process for a grain delivery terminal. The discrete event simulation approach has been applied to studies such as capacity planning and facility layout for a gasoline station and evaluating the resource requirements for a manufacturing facility. To …


Developing A Sustainable Business Plan At The Shopping Center Of Southpointe Mall In Lincoln, Nebraska, Jessica Marie Hanson Jul 2011

Developing A Sustainable Business Plan At The Shopping Center Of Southpointe Mall In Lincoln, Nebraska, Jessica Marie Hanson

Department of Environmental Studies: Undergraduate Student Theses

This project consists of creating sustainable business plans for a group of diverse retail stores at the mall of SouthPointe Pavilions in Lincoln, Nebraska. A series of interviews took place with five managers at the businesses including: Scheels, Old Chicago, Bed Bath and Beyond, Von Maur, and Barnes and Noble. The questions were based around five different topics including: Technological, Environment, Socio-Cultural, Economic, and Public Policy. The Technological area includes processes with the product (or service) that occur before it arrives, during, and after it is sold. The Public Policy area includes if the business has an environmental policy, how …