Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 11 of 11

Full-Text Articles in Business

Improving Service Performance For An International Container Shipping Company Using Index Approach:A Method And Applications, Kee-Kuo Chen, Jaw-Shen Wang, Ching-W Chu, Nce. Two Measur Chiu Chiu Oct 2010

Improving Service Performance For An International Container Shipping Company Using Index Approach:A Method And Applications, Kee-Kuo Chen, Jaw-Shen Wang, Ching-W Chu, Nce. Two Measur Chiu Chiu

Journal of Marine Science and Technology

The purpose of this study is to provide an alternative approach in importance-performance analysis (IPA) for improving service performance. Two measures, service performance index (SPI) and service improvement score (SIS), will be developed and included in the proposed approach which attempts to utilize both information directly reported by the respondents and indirectly estimated from model estimation as much as possible in IPA. For illustrating the proposed approach, the service performance improvement decision of an international container shipping company is studied. Results indicate that this company only deliveries 75% service quality desired by the customers, and that the service ability of …


Advertising Collusion In Retail Markets, Kyle Bagwell, Gea M. Lee Apr 2010

Advertising Collusion In Retail Markets, Kyle Bagwell, Gea M. Lee

Research Collection School Of Economics

We analyze non-price advertising by retail firms, when the firms are privately informed about their respective costs of production. In a static advertising game, an advertising equilibrium exists in which lower-cost firms select higher advertising levels. In this equilibrium, informed consumers rationally employ an advertising search rule in which they buy from the highest- advertising firm, since lower-cost firms also select lower prices. In a repeated advertising game, colluding firms face a tradeoff: the use of advertising can promote productive efficiency but only if sufficient current or future advertising expenses are incurred. At one extreme, if firms pool at zero …


Impacts Of It Resources On Business Performance Within The Context Of Mergers And Acquisitions, Viet T. Dao Jan 2010

Impacts Of It Resources On Business Performance Within The Context Of Mergers And Acquisitions, Viet T. Dao

Journal of International Technology and Information Management

No abstract provided.


The Impact Of Mobile Amusement Information On Use Behavior, Satisfaction, And Loyalty, Fumiyo N. Kondo, Jiro Hirata, Shahriar Akter Jan 2010

The Impact Of Mobile Amusement Information On Use Behavior, Satisfaction, And Loyalty, Fumiyo N. Kondo, Jiro Hirata, Shahriar Akter

Faculty of Commerce - Papers (Archive)

The relationship between satisfaction and loyalty has been well explored in services marketing or customer relationship management. In this study, the authors studied the relationship of 7 types of service variables under “amusement” factor. Amusement is one of the three factors extracted from 21 mobile information services. Among many different frameworks of satisfaction-loyalty, we used the framework of “past use behavior” on “satisfaction”, and then of “satisfaction” on “continued use intention” (or loyalty), resulting in a strong support of the existing model with positive significant influence on the both paths. Further, our research reveals that, on the both paths, there …


Exchange Of Information Agreements With Tax Havens: How Will This Affect The Rights Of Non-Resident Taxpayers And Investors?, John Mclaren Jan 2010

Exchange Of Information Agreements With Tax Havens: How Will This Affect The Rights Of Non-Resident Taxpayers And Investors?, John Mclaren

Faculty of Business - Papers (Archive)

The Organisation for Economic Cooperation and Development (OECD) appears to have been successful in convincing tax havens and countries with strict bank secrecy laws to exchange information on non-resident taxpayers, investors and businesses using their financial services. As at 18 August 2010, the OECD have confirmed that more than 320 Tax Information Exchange Agreements (TIEAs) and 150 Double Taxation Conventions that incorporate the new transparency standards have been signed between OECD member countries and non-OECD member states since 2006.531 While this situation may be good for tax administrators in the pursuit of their goal of maximising the collection of tax …


It As A Resource For Competitive Agility: An Analysis Of Firm Performance During Industry Turbulence, Shoshana Altschuller, David S. Gelb, Theresa F. Henry Jan 2010

It As A Resource For Competitive Agility: An Analysis Of Firm Performance During Industry Turbulence, Shoshana Altschuller, David S. Gelb, Theresa F. Henry

Journal of International Technology and Information Management

In an increasingly fast-paced business context, agility is crucial to firm performance. Competitive agility, the ability of a firm to rapidly sense and respond to changes in its environment, is especially important during industry turbulence. This research examines whether investment in Information Technology (IT) enhances firms’ competitive agility using analysis of firm performance during industry growth and contraction. The research approach addresses the causality question faced by previous IT productivity studies by focusing on ex-ante IT investment and subsequent firm performance during periods of unanticipated industry shocks. Findings indicate that IT investment enhances competitive agility but only in industries with …


Evaluating The Perceived Impact Of Collaborative Exchange And Formalization On Information Security, Randall Young Jan 2010

Evaluating The Perceived Impact Of Collaborative Exchange And Formalization On Information Security, Randall Young

Journal of International Technology and Information Management

Organizations integrate information security measures through information security planning and policy development. This study aims to examine how the extent of collaborative exchange within the organization and extent of formalization of the information security function impact the effective utilization of well-established information security objectives. The security objectives of interest, described in general deterrence theory, are deterrence, detection and recovery. This study finds that organizations that exhibit higher levels of collaborative exchange and develop and implement more information security policies are more effectively utilizing the information security strategies of detection, deterrence and recovery. This study highlights the importance of the complementary …


A Framework For Identifying And Understanding Risks In Information Technology Projects, Jack T. Marchewka Jan 2010

A Framework For Identifying And Understanding Risks In Information Technology Projects, Jack T. Marchewka

Journal of International Technology and Information Management

Managing the costs, complexity, and risks of IT projects continues to be a challenge for many organizations. Project risk management is becoming an important sub-discipline of software engineering, and focuses on identifying, analyzing, and developing strategies for responding to project risk efficiently and effectively. This paper presents an IT project risk identification framework to facilitate identifying and understanding various project risks as part of an overall project risk management process. The proposed framework should be of interest to IT practitioners during the creation of the project plan and over the course of a project so that appropriate and corrective actions …


Use Of A Fast Information Extraction Method As A Decision Support Tool, Mahmudul Sheikh, Sumali Conlon Jan 2010

Use Of A Fast Information Extraction Method As A Decision Support Tool, Mahmudul Sheikh, Sumali Conlon

Journal of International Technology and Information Management

Ad-hoc extraction of information from documents can ensure the transparency of decisions made by an organization. Different Information Extraction methods have been applied to extract information from various domains. Most widely known methods use manually annotated training documents that require high development time. The automated training methods are not scalable to large application domains. We have developed a semi-automated knowledge-engineering method for building the knowledge-base with minimal efforts. Because our method reduces manual processing of the training data, the development process is very fast. We have developed a prototype application to extract information from the project-reports of the American Recovery …


Gender Differences In The Determinants Of Sharing Information Via Mobile Phones, Chung-Chu Liu Jan 2010

Gender Differences In The Determinants Of Sharing Information Via Mobile Phones, Chung-Chu Liu

Journal of International Technology and Information Management

The notion of sharing information has become a critical element in competitive advantage for mobile phone companies. The purpose of this particular research is to collate, compare and prioritize gender differences in the determinants of sharing information via mobile phones. The content analysis and the analytic hierarchy process methods were made use of to collect and examine relevant data. According to the findings of this research, the determinants of information sharing via mobile phones may be arranged into four fundamental categories. The categories, in order of significant, are: situational factors (including time pressures, convenience, and price discounts), the unique characteristics …


Information Technology Certification Value: An Initial Response From Employers, David Wiershem, Guoying Zhang, Charles R. Johnston Jan 2010

Information Technology Certification Value: An Initial Response From Employers, David Wiershem, Guoying Zhang, Charles R. Johnston

Journal of International Technology and Information Management

This article looks at the value of certification from the employer's perspective. It is perhaps the first study in this area that gathers data directly from employers. A survey of directors of university information technology departments is analyzed, and the results indicate limited support for certifications being valued assets of their employees. While not sufficiently strong enough to warrant generalization of the results to business in general, with this information, students and professionals should be able to better prepare themselves for finding employment and academic programs can better evaluate the appropriateness of the inclusion of certification training in their curricula.