Open Access. Powered by Scholars. Published by Universities.®

Management Information Systems Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 18 of 18

Full-Text Articles in Management Information Systems

Reputation Stretching In Online Auctions, Jianqing Chen, Mei Lin, Andrew B. Whinston Dec 2006

Reputation Stretching In Online Auctions, Jianqing Chen, Mei Lin, Andrew B. Whinston

Research Collection School Of Computing and Information Systems

Reputation systems are ubiquitously employed in the online marketplaces to provide information on users’ abilities and trustworthiness. We focus particularly on the problem of reputation stretching, the extension of an established reputation into a new market. By examining various factors—market size, the expected performance in the expanding market, and the risk of performance in the expanding market—we characterize conditions that affect bidder’s stretching decision in the expanding market. Moreover, we analyze both the short-term and the long-term expanding cases, and obtain contrasting results in the two settings.


Supply Chain Information Sharing In A Macro Prediction Market, Zhiling Guo, Fang Fang, Andrew B. Whinston Dec 2006

Supply Chain Information Sharing In A Macro Prediction Market, Zhiling Guo, Fang Fang, Andrew B. Whinston

Research Collection School Of Computing and Information Systems

This paper aims to address supply chain partners' incentives for information sharing from an information systems design perspective. Specifically, we consider a supply chain characterized by N geographically distributed retailers who order a homogeneous product from one manufacturer. Each retailer's demand risk consists of two parts: a systematic risk part that affects all retailers and an idiosyncratic risk part that only has a local effect. We propose a macro prediction market to effectively elicit and aggregate useful information about systematic demand risk. We show that such information can be used to achieve accurate demand forecast sharing and better channel coordination …


Development Of Genetic Algorithm For Solving Scheduling Tasks In Fms With Coloured Petri Nets, Liana Napalkova, Galina Merkuryeva, Miquel Angel Piera Oct 2006

Development Of Genetic Algorithm For Solving Scheduling Tasks In Fms With Coloured Petri Nets, Liana Napalkova, Galina Merkuryeva, Miquel Angel Piera

Liana Napalkova

The paper describes the algorithm, which is developed to solve scheduling tasks in Flexible Manufacturing Systems. The algorithm is a combination of Genetic Algorithm and Coloured Petri Nets. It is proposed to use Coloured Petri Nets to tackle the encoding problem in Genetic Algorithm. The objective is to minimize the total make-span subject to different constraints obtained in Flexible Manufacturing Systems.


The Viability Of Is Enhanced Knowledge Sharing In Mission-Critical Command And Control Centers, Sameh A. Sabet Aug 2006

The Viability Of Is Enhanced Knowledge Sharing In Mission-Critical Command And Control Centers, Sameh A. Sabet

Dissertations

Engineering processes such as the maintenance of mission-critical infrastructures are highly unpredictable processes that are vital for everyday life, as well as for national security goals. These processes are categorized as Emergent Knowledge Processes (EKP), organizational processes that are characterized by a changing set of actors, distributed knowledge bases, and emergent knowledge sharing activities where the process itself has no predetermined structure. The research described here utilizes the telecommunications network fault diagnosis process as a specific example of an EKP. The field site chosen for this research is a global undersea telecommunication network where nodes are staffed by trained personnel …


Economics Of Information Security Investment In The Case Of Simultaneous Attacks, C. Derrick Huang, Qing Hu, Ravi S. Behara May 2006

Economics Of Information Security Investment In The Case Of Simultaneous Attacks, C. Derrick Huang, Qing Hu, Ravi S. Behara

Qing Hu

With billions of dollars being spent on information security related products and services each year, the economics of information security investment has become an important area of research, with significant implications for management practices. Drawing on recent studies that examine optimal security investment levels under various attack scenarios, we propose an economic model that considers simultaneous attacks from multiple external agents with distinct characteristics, and derive optimal investments based on the principle of benefit maximization. The relationships among the major variables, such as systems vulnerability, security breach probability, potential loss of security breach, and security investment levels, are investigated via …


Experimental And Empirical Perspectives On Grid Resource Allocation For The Singapore Market, Danny Oh, Steven Miller, Nan Hu Apr 2006

Experimental And Empirical Perspectives On Grid Resource Allocation For The Singapore Market, Danny Oh, Steven Miller, Nan Hu

Research Collection School Of Computing and Information Systems

In this paper, we describe our work on using the Tycoon system developed by HP Labs to provide a market-based resource allocation and bidding framework for a grid. We discuss how we intend to evaluate the feasibility of the Tycoon system by measuring its economic performance using agent-based simulation experiments for a particular type of grid usage scenario, namely, the digital media market scenario. We will also discuss a related effort in collecting and using real grid data from the National Grid Pilot Platform in Singapore and how we will be using real data collected to derive actual usage patterns …


Factors Impacting Key Management Effectiveness In Secured Wireless Networks, Yongjoo Shin Mar 2006

Factors Impacting Key Management Effectiveness In Secured Wireless Networks, Yongjoo Shin

Theses and Dissertations

The use of a Public Key Infrastructure (PKI) offers a cryptographic solution that can overcome many, but not all, of the MANET security problems. One of the most critical aspects of a PKI system is how well it implements Key Management. Key Management deals with key generation, key storage, key distribution, key updating, key revocation, and certificate service in accordance with security policies over the lifecycle of the cryptography. The approach supported by traditional PKI works well in fixed wired networks, but it may not appropriate for MANET due to the lack of fixed infrastructure to support the PKI. This …


Tacit Knowledge, Nonaka And Takeuchi Seci Model And Informal Knowledge Processes, Siu Loon Hoe Mar 2006

Tacit Knowledge, Nonaka And Takeuchi Seci Model And Informal Knowledge Processes, Siu Loon Hoe

Research Collection School Of Computing and Information Systems

The organizational behavior and knowledge management literature has devoted a lot attention on how structural knowledge processes enhance learning. There has been little emphasis on the informal knowledge processes and the construct remains undefined. The purpose of this paper is to highlight the importance of informal knowledge processes, propose a definition for these processes and link them to the socialization and internalization processes suggested by Nonaka and Takeuchi in the SECI model. The paper offers a fresh perspective on how informal knowledge processes in organizations help to enhance the organization’s learning capability. It will enable scholars and managers to have …


Text Mining With Exploitation Of User's Background Knowledge : Discovering Novel Association Rules From Text, Xin Chen Jan 2006

Text Mining With Exploitation Of User's Background Knowledge : Discovering Novel Association Rules From Text, Xin Chen

Dissertations

The goal of text mining is to find interesting and non-trivial patterns or knowledge from unstructured documents. Both objective and subjective measures have been proposed in the literature to evaluate the interestingness of discovered patterns. However, objective measures alone are insufficient because such measures do not consider knowledge and interests of the users. Subjective measures require explicit input of user expectations which is difficult or even impossible to obtain in text mining environments.

This study proposes a user-oriented text-mining framework and applies it to the problem of discovering novel association rules from documents. The developed system, uMining, consists of two …


Dynamic Measuring Tools For Online Discourse, Jeffrey S. Saltz Jan 2006

Dynamic Measuring Tools For Online Discourse, Jeffrey S. Saltz

Dissertations

When evaluating participation within an Asynchronous Learning Network (ALN), current best practices include counting messages and reviewing participant surveys. To understand the impact of more advanced dynamic measurement tools for use within an ALN, a web-based tool, known as iPET (the integrated Participation Evaluation Tool), was created. iPET, which leverages Social Network Analysis and Information Visualization techniques, was then evaluated via an empirical study. This research demonstrates that using a tool such as iPET increases participation within an ALN without increasing facilitator workload. Due to the fact that active online discussion is a key factor in the success of an …


Using Content And Process Scaffolds For Collaborative Discourse In Asynchronous Learning Networks, Irene Wong-Bushby Jan 2006

Using Content And Process Scaffolds For Collaborative Discourse In Asynchronous Learning Networks, Irene Wong-Bushby

Dissertations

Discourse, a form of collaborative learning, is one of the most widely used methods of teaching and learning in the online environment. Particularly, in large courses, discourse needs to be 'structured' to be effective. Historically, technology-mediated learning (TML) research has been inconclusive with often conflicting results. To address this issue, TML research needs greater breadth and depth in pedagogical grounding. The purpose of this research is to build and test an original, technology-mediated, discourse-centered model called the Asynchronous Learning Network Cognitive Discourse Model (ALNCDM) grounded in pedagogy. Cognitive discourse is defined as discourse on conceptual subject matter. The model is …


Biometric Security: Are Inexpensive Biometric Devices Reliable Enough To Gain Wide-Spread Security Usage?, Brian Thanh Tran Jan 2006

Biometric Security: Are Inexpensive Biometric Devices Reliable Enough To Gain Wide-Spread Security Usage?, Brian Thanh Tran

Inquiry: The University of Arkansas Undergraduate Research Journal

The ever growing need for security in today' s world requires exploring the feasibility of various security methods to ensure the safety of the world's population. With the tremendous growth of technology, e-commerce, and business globalization, society implements new methods to try to battle security problems. Technology advances has resulted in a number of inexpensive biometric devices to the marketplace. Two questions surface regarding this devices-are they reliable enough for general usage and will people be willing to use them? This research conducted a repeated design experiment to determine the effectiveness of four inexpensive biometric devices-three fingerprint readers and an …


Development Of A Design Environment For End Users To Build The Target-Relevant Decision Support Tools In Rural Industry, Shah Jahan Miah Jan 2006

Development Of A Design Environment For End Users To Build The Target-Relevant Decision Support Tools In Rural Industry, Shah Jahan Miah

Dr Shah Jahan Miah

Decision support systems (DSS) developed by end users have had limited success in rural operations. This paper will discuss the development stages of a new tool for improving the DSS development process in the rural industries. The object of this project is to develop an end user enabled design environment (EUEDE) which will allow a non-technical computer user to build target-relevant decision support tools. The resultant design environment aims to allow the end user to re-use and share their knowledge within a specific business context. This approach will facilitate flexibility to build relevant DSS’s for an end user’s specific decision …


Dynamic Generation Of A Table Of Contents With Consumer-Friendly Labels, Trudi Miller '08, Gondy Leroy, Elizabeth Wood Jan 2006

Dynamic Generation Of A Table Of Contents With Consumer-Friendly Labels, Trudi Miller '08, Gondy Leroy, Elizabeth Wood

CGU Faculty Publications and Research

Consumers increasingly look to the Internet for health information, but available resources are too difficult for the majority to understand. Interactive tables of contents (TOC) can help consumers access health information by providing an easy to understand structure. Using natural language processing and the Unified Medical Language System (UMLS), we have automatically generated TOCs for consumer health information. The TOC are categorized according to consumer-friendly labels for the UMLS semantic types and semantic groups. Categorizing phrases by semantic types is significantly more correct and relevant. Greater correctness and relevance was achieved with documents that are difficult to read than with …


Health Information Text Characteristics, Gondy Leroy, Evren Eryilmaz '11, Benjamin T. Laroya Jan 2006

Health Information Text Characteristics, Gondy Leroy, Evren Eryilmaz '11, Benjamin T. Laroya

CGU Faculty Publications and Research

Millions of people search online for medical text, but these texts are often too complicated to understand. Readability evaluations are mostly based on surface metrics such as character or words counts and sentence syntax, but content is ignored. We compared four types of documents, easy and difficult WebMD documents, patient blogs, and patient educational material, for surface and content-based metrics. The documents differed significantly in reading grade levels and vocabulary used. WebMD pages with high readability also used terminology that was more consumer-friendly. Moreover, difficult documents are harder to understand due to their grammar and word choice and because they …


Using A Digital Library Of Images For Communication: Comparison Of A Card-Based System To Pda Software, Trudi Miller '08, Gondy Leroy, John Huang '05, Serena Chuang '05 Jan 2006

Using A Digital Library Of Images For Communication: Comparison Of A Card-Based System To Pda Software, Trudi Miller '08, Gondy Leroy, John Huang '05, Serena Chuang '05

CGU Faculty Publications and Research

Autism spectrum disorder has become one of the most prevalent developmental disorders and one of the main impairments is difficulty with communication. One method of augmentative and alternative communication is the use of the Picture Exchange Communication System (PECS) to create messages using a series of images printed on cards and organized in binders. We are developing a digital alternative based on an image library that is displayed on a personal digital assistant (PDA). We conducted an initial user acceptance study that compared the effectiveness and usability of both systems. The study showed that the PDA system was able to …


Journey To The Center Of The Core: Computers And The Internet In The Core Curriculum, Jorge Pérez, Meg C. Murray Jan 2006

Journey To The Center Of The Core: Computers And The Internet In The Core Curriculum, Jorge Pérez, Meg C. Murray

Faculty and Research Publications

Computers, digitalization and the Internet have transformed modern society. Commerce, education, communication and socialization will never be the same. Surprisingly, many universities do not require a computing course in the core curriculum. Critical information technology (IT) competencies are often taken for granted, to the detriment of students who lack computing and Internet skills. This paper describes an initiative undertaken by a computer science and information systems department to assess and remediate IT skills needed by all university students, regardless of major. The project is evolving along several dimensions: identification of discipline-independent IT competencies, assessment of IT skills among current and …


Economics Of Information Security Investment In The Case Of Simultaneous Attacks, C. Derrick Huang, Qing Hu, Ravi S. Behara Dec 2005

Economics Of Information Security Investment In The Case Of Simultaneous Attacks, C. Derrick Huang, Qing Hu, Ravi S. Behara

Qing Hu

With billions of dollars being spent on information security related products and services each year, the economics of information security investment has become an important area of research, with significant implications for management practices. Drawing on recent studies that examine optimal security investment levels under various attack scenarios, we propose an economic model that considers simultaneous attacks from multiple external agents with distinct characteristics, and derive optimal investments based on the principle of benefit maximization. The relationships among the major variables, such as systems vulnerability, security breach probability, potential loss of security breach, and security investment levels, are investigated via …