Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 4 of 4

Full-Text Articles in Business

A Monte-Carlo Analysis Of Monetary Impact Of Mega Data Breaches, Mustafa Canan, Omer Ilker Poyraz, Anthony Akil Jan 2021

A Monte-Carlo Analysis Of Monetary Impact Of Mega Data Breaches, Mustafa Canan, Omer Ilker Poyraz, Anthony Akil

Engineering Management & Systems Engineering Faculty Publications

The monetary impact of mega data breaches has been a significant concern for enterprises. The study of data breach risk assessment is a necessity for organizations to have effective cybersecurity risk management. Due to the lack of available data, it is not easy to obtain a comprehensive understanding of the interactions among factors that affect the cost of mega data breaches. The Monte Carlo analysis results were used to explicate the interactions among independent variables and emerging patterns in the variation of the total data breach cost. The findings of this study are as follows: The total data breach cost …


Ranking Influential Nodes Of Fake News Spreading On Mobile Social Networks, Yunfei Xing, Xiwei Wang, Fang-Kwei Wang, Yang Shi, Wu He, Haowu Chang Jan 2021

Ranking Influential Nodes Of Fake News Spreading On Mobile Social Networks, Yunfei Xing, Xiwei Wang, Fang-Kwei Wang, Yang Shi, Wu He, Haowu Chang

Information Technology & Decision Sciences Faculty Publications

Online fake news can generate a negative impact on both users and society. Due to the concerns with spread of fake news and misinformation, assessing the network influence of online users has become an important issue. This study quantifies the influence of nodes by proposing an algorithm based on information entropy theory. Dynamic process of influence of nodes is characterized on mobile social networks (MSNs). Weibo (i.e., the Chinese version of microblogging) users are chosen to build the real network and quantified influence of them is analyzed according to the model proposed in this paper. MATLAB is employed to simulate …


Application Of Theory Of Constraints (Toc) In Managing Project Information Constraints, Ferdinand Z. Prantl Apr 2020

Application Of Theory Of Constraints (Toc) In Managing Project Information Constraints, Ferdinand Z. Prantl

Engineering Management & Systems Engineering Projects for D. Eng. Degree

The scope of this doctoral project is the non-traditional application of Drum-Buffer-Rope (DBR) from the area of Theory of Constraints (ToC) in mitigating disruption in distribution facilities during phased upgrades caused by information constraint. The relevance of this project is that industrial equipment upgrades pose a significant risk of disrupting the operation of automated distribution facilities. It is partly due to a very high expected availability rate, as well as tight coupling with other upstream and downstream elements of the larger supply chain network. As a consequence of disruption in this scenario, losses incurred not only within the facility being …


The Choice Of Technology And Equilibrium Wage Rigidity, Haiwen Zhou Jan 2015

The Choice Of Technology And Equilibrium Wage Rigidity, Haiwen Zhou

Economics Faculty Publications

In this general equilibrium model, firms engage in oligopolistic competition and choose increasing returns technologies to maximize profits. Capital and labor are the two factors of production. The existence of efficiency wages leads to unemployment. The model is able to explain some interesting observations of the labor market. First, even though there is neither long-term labor contract nor costs of wage adjustment, wage rigidity is an equilibrium phenomenon: an increase in the exogenous job separation rate, the size of the population, the cost of exerting effort, and the probability that shirking is detected will not change the equilibrium wage rate. …