Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 27 of 27

Full-Text Articles in Business

A Unified Interdisciplinary Theory Of Open Source Culture And Entertainment, Jerald Hughes, Karl Reiner Lang, Eric K. Clemons, Robert J. Kauffman Dec 2007

A Unified Interdisciplinary Theory Of Open Source Culture And Entertainment, Jerald Hughes, Karl Reiner Lang, Eric K. Clemons, Robert J. Kauffman

Research Collection School Of Computing and Information Systems

Digital technologies are profoundly transforming the production and consumption of culture and entertainment products. The emerging digital re-mix culture is an open source approach where content products in the arts and entertainment industries are increasingly rearranged, manipulated, and extended in the process of creating new works. This article offers a unified description of the tools and techniques that led to the development of the open source culture and that enable the processes which promote re-use of previously recorded materials. It then lays out the incentives and forces that either promote or inhibit the development, distribution, and consumption of modified cultural …


Competition In Modular Clusters, Carliss Y. Baldwin, C. Jason Woodard Dec 2007

Competition In Modular Clusters, Carliss Y. Baldwin, C. Jason Woodard

Research Collection School Of Computing and Information Systems

The last twenty years have witnessed the rise of disaggregated “clusters,” “networks,” or “ecosystems” of firms. In these clusters the activities of R&D, product design, production, distribution, and system integration may be split up among hundreds or even thousands of firms. Different firms will design and produce the different components of a complex artifact (like the processor, peripherals, and software of a computer system), and different firms will specialize in different stages of a complex production process. This paper considers the pricing behavior and profitability of these so-called modular clusters. In particular, we investigate a possibility hinted at in prior …


An Information-Sharing Based Anti-Phishing System, Yueqing Cheng, Zhen Yuan, Lei Ma, Robert H. Deng Nov 2007

An Information-Sharing Based Anti-Phishing System, Yueqing Cheng, Zhen Yuan, Lei Ma, Robert H. Deng

Research Collection School Of Computing and Information Systems

This paper presents the design of an informationsharing based or server-assisted anti-phishing system. The system follows a client-server architecture and makes decision based on not only client side heuristics but also collective information from multiple clients. When visiting a web site, a client side proxy, installed as a plug-in to a browser, decides on the legitimacy of the web site based on a combination of white list, black list and heuristics. In case the client side proxy does not have sufficient information to make a clear judgment, it reports the suspicious site to a central server which has access to …


Multi-Period Combinatorial Auction Mechanism For Distributed Resource Allocation And Scheduling, Hoong Chuin Lau, Shih-Fen Cheng, Thin Yin Leong, Jong Han Park, Zhengyi Zhao Nov 2007

Multi-Period Combinatorial Auction Mechanism For Distributed Resource Allocation And Scheduling, Hoong Chuin Lau, Shih-Fen Cheng, Thin Yin Leong, Jong Han Park, Zhengyi Zhao

Research Collection School Of Computing and Information Systems

We consider the problem of resource allocation and scheduling where information and decisions are decentralized, and our goal is to propose a market mechanism that allows resources from a central resource pool to be allocated to distributed decision makers (agents) that seek to optimize their respective scheduling goals. We propose a generic combinatorial auction mechanism that allows agents to competitively bid for the resources needed in a multi-period setting, regardless of the respective scheduling problem faced by the agent, and show how agents can design optimal bidding strategies to respond to price adjustment strategies from the auctioneer. We apply our …


The Price Of Stability In Selfish Scheduling Games, Lucas Agussurja, Hoong Chuin Lau Nov 2007

The Price Of Stability In Selfish Scheduling Games, Lucas Agussurja, Hoong Chuin Lau

Research Collection School Of Computing and Information Systems

Game theory has gained popularity as an approach to analysing and understanding distributed systems with selfinterested agents. Central to game theory is the concept of Nash equilibrium as a stable state (solution) of the system, which comes with a price - the loss in efficiency. The quantification of the efficiency loss is one of the main research concerns. In this paper, we study the quality and computational characteristic of the best Nash equilibrium in two selfish scheduling models: the congestion model and the sequencing model. In particular, we present the following results: (1) In the congestion model: first, the best …


Modeling Semantics In Composite Web Service Requests By Utility Elicitation, Qianhui Althea Liang, Jen Yao Chung, Steven M. Miller Nov 2007

Modeling Semantics In Composite Web Service Requests By Utility Elicitation, Qianhui Althea Liang, Jen Yao Chung, Steven M. Miller

Research Collection School Of Computing and Information Systems

When meeting the challenges in automatic and semi-automatic Web service composition, capturing the user’s service demand and preferences is as important as knowing what the services can do. This paper discusses the idea of semantic service requests for composite services, and presents a multi-attribute utility theory (MAUT) based model of composite service requests. Service requests are modeled as user preferences and constraints. Two preference structures, additive independence and generalized additive independence, are utilized in calculating the expected utilities of service composition outcomes. The model is also based on an iterative and incremental scheme meant to better capture requirements in accordance …


Designing The Market Game For A Commodity Trading Simulation, Shih-Fen Cheng Nov 2007

Designing The Market Game For A Commodity Trading Simulation, Shih-Fen Cheng

Research Collection School Of Computing and Information Systems

In this paper, we propose to design a market game that (a) can be used in modeling and studying commodity trading scenarios, and (b) can be used in capturing human traders' behaviors. Specifically, we demonstrate the usefulness of this commodity trading game in a single-commodity futures trading scenario. A pilot experiment was run with a mixture of human traders and an autonomous agent that emulates the aggregatedmarket condition, with the assumption that this autonomous agent would hint each of its action through a public announcement. We show that the information collected from this simulation can be used to extract the …


Follow The Leader? Price Change Timing In Internet-Based Selling, R. J. Kauffman, Charles A. Wood Oct 2007

Follow The Leader? Price Change Timing In Internet-Based Selling, R. J. Kauffman, Charles A. Wood

Research Collection School Of Computing and Information Systems

Internet technologies should lessen information asymmetry, prompting competitive price reactions, but this does not seem to be happening in Internet-based selling. We study empirical regularities of price change timing for music CD vendors and booksellers to assess several theoretical explanations. Our sample includes 123, 680 daily prices for 169 products and 53 firms. Bertrand competition is insufficient to explain our observation that sellers do not shift prices this way. Tacitly collusive responses to competitors' price changes are observed rather than price changes solely in response to demand or cost shifts as would be expected with Bertrand competition. We find evidence …


Preserving Privacy In Supply Chain Management: A Challenge For Next Generation Data Mining, Madhu Ahluwalia, Zhiyuan Chen, Arrya Gangopadhyay, Zhiling Guo Oct 2007

Preserving Privacy In Supply Chain Management: A Challenge For Next Generation Data Mining, Madhu Ahluwalia, Zhiyuan Chen, Arrya Gangopadhyay, Zhiling Guo

Research Collection School Of Computing and Information Systems

In this paper we identify a major area of research as a topic for next generation data mining. The research effort in the last decade on privacy preserving data mining has resulted in the development of numerous algorithms. However, most of the existing research has not been applied in any particular application context. Hence it is unclear whether the current algorithms are directly applicable in any particular problem context. In this paper we identify a significant application context that not only requires protection of privacy but also sophisticated data analysis. The area in question is supply chain management, arguably one …


Analyzing Service Usage Patterns: Methodology And Simulation, Qianhui (Althea) Liang, Jen-Yao Chung Oct 2007

Analyzing Service Usage Patterns: Methodology And Simulation, Qianhui (Althea) Liang, Jen-Yao Chung

Research Collection School Of Computing and Information Systems

This paper proposes that service mining technology will power the construction of new business services via both intra- and inter-enterprise service assembly within the Service Oriented Architecture (SOA) framework. We investigate the methodologies of service mining at the component level of service usage. We also demonstrate how mining of service usage patterns is intended to be used to improve different aspects of service composition. Simulation experiments conducted for mining at the component level are analyzed. The processing details within a general service mining deployment are demonstrated.


Robust Local Search And Its Application To Generating Robust Schedules, Hoong Chuin Lau, Fei Xiao, Thomas Ou Sep 2007

Robust Local Search And Its Application To Generating Robust Schedules, Hoong Chuin Lau, Fei Xiao, Thomas Ou

Research Collection School Of Computing and Information Systems

In this paper, we propose an extended local search framework to solve combinatorial optimization problems with data uncertainty. Our approach represents a major departure from scenario-based or stochastic programming approaches often used to tackle uncertainty. Given a value 0 < ? 1, we are interested to know what the robust objective value is, i.e. the optimal value if we allow an chance of not meeting it, assuming that certain data values are defined on bounded random variables. We show how a standard local search or metaheuristic routine can be extended to efficiently construct a decision rule with such guarantee, albeit heuristically. We demonstrate its practical applicability on the Resource Constrained Project Scheduling Problem with minimal and maximal time lags (RCPSP/max) taking into consideration activity duration uncertainty. Experiments show that, partial order schedules can be constructed that are robust in our sense without the need for a large planned horizon (due date), which improves upon the work proposed by Policella et al. 2004.


Innovation Stack - Choosing Innovations For Commercialization, Arcot Desai Narasimhalu Aug 2007

Innovation Stack - Choosing Innovations For Commercialization, Arcot Desai Narasimhalu

Research Collection School Of Computing and Information Systems

This paper describes a method for enterprises to order the innovations of interest according to a number of parameters including their own business strategy and core competencies. The method takes into account aspects such as ability to create entry barriers and complementary assets. Enterprises can now use this method to both filter out innovations that may not be of interest to them and then order the short listed or selected innovations according to their attractiveness.


Re-Engineering Xid Technologies - From Enterprise To Consumer Markets, Arcot Desai Narasimhalu Aug 2007

Re-Engineering Xid Technologies - From Enterprise To Consumer Markets, Arcot Desai Narasimhalu

Research Collection School Of Computing and Information Systems

Several studies have addressed the process of taking ideas to markets but few have shared the experiences of start up companies that have reexamined their product strategies and repositioned their products and services for better revenues and profits. This paper reports the efforts related to repositioning of XID technologies, a start up company, into new markets while continuing to exploit its core technical competencies.


Mapping Better Business Strategies With Gis, Tin Seong Kam Aug 2007

Mapping Better Business Strategies With Gis, Tin Seong Kam

Research Collection School Of Computing and Information Systems

The value of location as a business measure is fast becoming an important consideration for organisations. GIS (Geographical Information Systems), with its capability to manage, display, analyse business information spatially, is emerging as a powerful location intelligence tool. In the US, Starbucks, Blockbuster, Hyundai, and thousands of other businesses use census data and GIS software to help them understand what types of people buy their products and services, and how to better market to these consumers. For example, McDonald’s in Japan uses a GIS system to overlay demographic information on maps to help identify promising new store sites. Singapore Management …


Designing The Value Curve For Your Next Innovation, Arcot Desai Narasimhalu Aug 2007

Designing The Value Curve For Your Next Innovation, Arcot Desai Narasimhalu

Research Collection School Of Computing and Information Systems

This paper introduces an additional feature to the strategy canvas and value curve that will make innovation designers more effective. The new feature is to let the innovators carry out the designs of their new innovations taking into account both the cost of improving the quality of a parameter that the users value highly and the savings accrued from the drop in provisioning for parameters that users place less emphasis in an innovation.


Improving Memory-Based Collaborative Filtering Using A Factor-Based Approach, Zhenxue Zhang, Dongsong Zhang, Zhiling Guo Jul 2007

Improving Memory-Based Collaborative Filtering Using A Factor-Based Approach, Zhenxue Zhang, Dongsong Zhang, Zhiling Guo

Research Collection School Of Computing and Information Systems

Collaborative Filtering (CF) systems generate recommendations for a user by aggregating item ratings of other like-minded users. The memory-based approach is a common technique used in CF. This approach first uses statistical methods such as Pearson’s Correlation Coefficient to measure user similarities based on their previous ratings on different items. Users will then be grouped into different neighborhood depending on the calculated similarities. Finally, the system will generate predictions on how a user would rate a specific item by aggregating ratings on the item cast by the identified neighbors of his/her. However, current memory-based CF method only measures user similarities …


Generating Job Schedules For Vessel Operations In A Container Terminal, Thin Yin Leong, Hoong Chuin Lau Jul 2007

Generating Job Schedules For Vessel Operations In A Container Terminal, Thin Yin Leong, Hoong Chuin Lau

Research Collection School Of Computing and Information Systems

No abstract provided.


The Business Model Of "Software-As-A-Service", Dan Ma Jul 2007

The Business Model Of "Software-As-A-Service", Dan Ma

Research Collection School Of Computing and Information Systems

The emergence of the software-as-a-service (SaaS) business model has attracted great attentions from both researchers and practitioners. SaaS vendors deliver on-demand information processing services to users, and thus offer computing utility rather than the standalone software itself. In this work, the author propose an analytical model to study the competition between the SaaS and the traditional COTS (commercial off-the-shelf) solutions for software applications. The author show that when software applications become open, modulated, and standardized, the SaaS business model will take a significant market share. In addition, under certain market conditions, offering users an easy exit option through the software …


Is Interpersonal Trust A Necessary Condition For Organisational Learning?, Siu Loon Hoe Jul 2007

Is Interpersonal Trust A Necessary Condition For Organisational Learning?, Siu Loon Hoe

Research Collection School Of Computing and Information Systems

The organisational behaviour and management literature has devoted a lot attention on various factors affecting organisational learning. While there has been much work done to examine trust in promoting organisational learning, there is a lack of consensus on the specific type of trust involved. The purpose of this paper is to highlight the importance of interpersonal trust in promoting organisational learning and propose a research agenda to test the extent of interpersonal trust on organisational learning. This paper contributes to the existing organisational learning literature by specifying a specific form of trust, interpersonal trust, which promotes organisational learning and proposing …


Making The ‘Most’ Out Of Rfid Technology: A Research Agenda For The Study Of The Adoption, Use And Impact Of Rfid, John Curtin, Robert J. Kauffman, Frederick J. Riggins Jun 2007

Making The ‘Most’ Out Of Rfid Technology: A Research Agenda For The Study Of The Adoption, Use And Impact Of Rfid, John Curtin, Robert J. Kauffman, Frederick J. Riggins

Research Collection School Of Computing and Information Systems

Radio frequency identification (RFID) technology dramatically increases the ability of the organization to acquire a vast array of data about the location and properties of any entity that can be physically tagged and wirelessly scanned within certain technical limitations. RFID can be applied to a variety of tasks, structures, work systems and contexts along the value chain, including business-to-business logistics, internal operations, business-to-consumer marketing, and after-sales service applications. As industry adoption of RFID increases there is an emerging interest by academic researchers to engage in scholarly investigation to understand how RFID relates to mobility, organizational and systems technologies (MOST). In …


Innovation Engine, Arcot Desai Narasimhalu Jun 2007

Innovation Engine, Arcot Desai Narasimhalu

Research Collection School Of Computing and Information Systems

This paper describes a meta-model for innovation using an automobile engine as a metaphor. This innovation meta-model is used to manage a collection of innovation models. We develop an algorithm to identify innovations with potential for success using this meta-model. This meta-model can be used by corporations and individuals to identify plausible innovations at any given point in time.


Modeling Architectural Strategy Using Design Structure Networks, C. Jason Woodard May 2007

Modeling Architectural Strategy Using Design Structure Networks, C. Jason Woodard

Research Collection School Of Computing and Information Systems

System architects face the formidable task of purposefully shaping an evolving space of complex designs. Their task s further complicated when they lack full control of the design process, and therefore must anticipate the behavior of other stakeholders, including the designers of component products and competing systems. This paper presents a conceptual tool called a design structure network (DSN) to help architects and design scientists reason effectively about these situations. A DSN is a graphical representation of a system’s design space. DSNs improve on existing representation schemes by providing a compact and intuitive way to express design options—the ability to …


Valuing Information Technology Infrastructures: A Growth Options Approach, Qizhi Dai, Robert J. Kauffman, Salvatore T. March Mar 2007

Valuing Information Technology Infrastructures: A Growth Options Approach, Qizhi Dai, Robert J. Kauffman, Salvatore T. March

Research Collection School Of Computing and Information Systems

Decisions to invest in information technology (IT) infrastructure are often made based on an assessment of its immediate value to the organization. However, an important source of value comes from the fact that such technologies have the potential to be leveraged in the development of future applications. From a real options perspective, IT infrastructure investments create growth options that can be exercised if and when an organization decides to develop systems to provide new or enhanced IT capabilities. We present an analytical model based on real options that shows the process by which this potential is converted into business value, …


Logistics Network Design With Supplier Consolidation Hubs And Multiple Shipment Options, Michelle L. F. Cheong, Rohit Bhatnagar, Stephen C. Graves Feb 2007

Logistics Network Design With Supplier Consolidation Hubs And Multiple Shipment Options, Michelle L. F. Cheong, Rohit Bhatnagar, Stephen C. Graves

Research Collection School Of Computing and Information Systems

An important service provided by third-party logistics (3PL) firms is to manage the inbound logistics of raw materials and components from multiple suppliers to several manufacturing plants. A key challenge for these 3PL firms is to determine how to coordinate and consolidate the transportation flow, so as to get the best overall logistics performance. One tactic is to establish consolidation hubs that collect shipments from several suppliers, consolidate these shipments, and direct the consolidated shipments to the appropriate manufacturing plant. We consider the network design problem to implement this tactic, namely deciding the number, location and operation of consolidation hubs …


Value-At-Risk In It Services Contracts, Robert J. Kauffman, Ryan Sougstad Jan 2007

Value-At-Risk In It Services Contracts, Robert J. Kauffman, Ryan Sougstad

Research Collection School Of Computing and Information Systems

As information systems (IS) and technology solutions become increasingly service-driven, managers are faced with the task of choosing parameters such as service-levels, pricing, and contract duration. Information technology (IT) services vendors manage portfolios of contracts in which parameters, decided at inception, are often subject to future risks. The contract profit maximization decision may adversely affect the risk position of the firm's portfolio of services contracts. We propose a model to inform vendors on setting optimal parameters for IS contracts subject to acceptable levels of risk. The analytic model presented draws from IS economics research and the principles of value-at-risk (VaR) …


Towards Efficient Computation Of Quality Bounded Solutions In Pomdps: Expected Value Approximation And Dynamic Disjunctive Beliefs, Pradeep Reddy Varakantham, Rajiv Maheswaran, Tapana Gupta, Milind Tambe Jan 2007

Towards Efficient Computation Of Quality Bounded Solutions In Pomdps: Expected Value Approximation And Dynamic Disjunctive Beliefs, Pradeep Reddy Varakantham, Rajiv Maheswaran, Tapana Gupta, Milind Tambe

Research Collection School Of Computing and Information Systems

While POMDPs (partially observable markov decision problems) are a popular computational model with wide-ranging applications, the computational cost for optimal policy generation is prohibitive. Researchers are investigating ever-more efficient algorithms, yet many applications demand such algorithms bound any loss in policy quality when chasing efficiency. To address this challenge, we present two new techniques. The first approximates in the value space to obtain solutions efficiently for a pre-specified error bound. Unlike existing techniques, our technique guarantees the resulting policy will meet this bound. Furthermore, it does not require costly computations to determine the quality loss of the policy. Our second …


Real-Time Supply Chain Control Via Multi-Agent Adjustable Autonomy, Hoong Chuin Lau, Lucas Agussurja, Ramesh Thangarajoo Jan 2007

Real-Time Supply Chain Control Via Multi-Agent Adjustable Autonomy, Hoong Chuin Lau, Lucas Agussurja, Ramesh Thangarajoo

Research Collection School Of Computing and Information Systems

Real-time supply chain management in a rapidly changing environment requires reactive and dynamic collaboration among participating entities. In this work, we model supply chain as a multi-agent system where agents are subject to an adjustable autonomy. The autonomy of an agent refers to its capability to make and influence decisions within a multi-agent system. Adjustable autonomy means changing the autonomy of the agents during runtime as a response to changes in the environment. In the context of a supply chain, different entities will have different autonomy levels and objective functions as the environment changes, and the goal is to design …