Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 121 - 149 of 149

Full-Text Articles in Physical Sciences and Mathematics

Modeling Architectural Strategy Using Design Structure Networks, C. Jason Woodard May 2007

Modeling Architectural Strategy Using Design Structure Networks, C. Jason Woodard

Research Collection School Of Computing and Information Systems

System architects face the formidable task of purposefully shaping an evolving space of complex designs. Their task s further complicated when they lack full control of the design process, and therefore must anticipate the behavior of other stakeholders, including the designers of component products and competing systems. This paper presents a conceptual tool called a design structure network (DSN) to help architects and design scientists reason effectively about these situations. A DSN is a graphical representation of a system’s design space. DSNs improve on existing representation schemes by providing a compact and intuitive way to express design options—the ability to …


Valuing Information Technology Infrastructures: A Growth Options Approach, Qizhi Dai, Robert J. Kauffman, Salvatore T. March Mar 2007

Valuing Information Technology Infrastructures: A Growth Options Approach, Qizhi Dai, Robert J. Kauffman, Salvatore T. March

Research Collection School Of Computing and Information Systems

Decisions to invest in information technology (IT) infrastructure are often made based on an assessment of its immediate value to the organization. However, an important source of value comes from the fact that such technologies have the potential to be leveraged in the development of future applications. From a real options perspective, IT infrastructure investments create growth options that can be exercised if and when an organization decides to develop systems to provide new or enhanced IT capabilities. We present an analytical model based on real options that shows the process by which this potential is converted into business value, …


Real-Time Supply Chain Control Via Multi-Agent Adjustable Autonomy, Hoong Chuin Lau, Lucas Agussurja, Ramesh Thangarajoo Jan 2007

Real-Time Supply Chain Control Via Multi-Agent Adjustable Autonomy, Hoong Chuin Lau, Lucas Agussurja, Ramesh Thangarajoo

Research Collection School Of Computing and Information Systems

Real-time supply chain management in a rapidly changing environment requires reactive and dynamic collaboration among participating entities. In this work, we model supply chain as a multi-agent system where agents are subject to an adjustable autonomy. The autonomy of an agent refers to its capability to make and influence decisions within a multi-agent system. Adjustable autonomy means changing the autonomy of the agents during runtime as a response to changes in the environment. In the context of a supply chain, different entities will have different autonomy levels and objective functions as the environment changes, and the goal is to design …


Value-At-Risk In It Services Contracts, Robert J. Kauffman, Ryan Sougstad Jan 2007

Value-At-Risk In It Services Contracts, Robert J. Kauffman, Ryan Sougstad

Research Collection School Of Computing and Information Systems

As information systems (IS) and technology solutions become increasingly service-driven, managers are faced with the task of choosing parameters such as service-levels, pricing, and contract duration. Information technology (IT) services vendors manage portfolios of contracts in which parameters, decided at inception, are often subject to future risks. The contract profit maximization decision may adversely affect the risk position of the firm's portfolio of services contracts. We propose a model to inform vendors on setting optimal parameters for IS contracts subject to acceptable levels of risk. The analytic model presented draws from IS economics research and the principles of value-at-risk (VaR) …


Reputation Stretching In Online Auctions, Jianqing Chen, Mei Lin, Andrew B. Whinston Dec 2006

Reputation Stretching In Online Auctions, Jianqing Chen, Mei Lin, Andrew B. Whinston

Research Collection School Of Computing and Information Systems

Reputation systems are ubiquitously employed in the online marketplaces to provide information on users’ abilities and trustworthiness. We focus particularly on the problem of reputation stretching, the extension of an established reputation into a new market. By examining various factors—market size, the expected performance in the expanding market, and the risk of performance in the expanding market—we characterize conditions that affect bidder’s stretching decision in the expanding market. Moreover, we analyze both the short-term and the long-term expanding cases, and obtain contrasting results in the two settings.


Supply Chain Information Sharing In A Macro Prediction Market, Zhiling Guo, Fang Fang, Andrew B. Whinston Dec 2006

Supply Chain Information Sharing In A Macro Prediction Market, Zhiling Guo, Fang Fang, Andrew B. Whinston

Research Collection School Of Computing and Information Systems

This paper aims to address supply chain partners' incentives for information sharing from an information systems design perspective. Specifically, we consider a supply chain characterized by N geographically distributed retailers who order a homogeneous product from one manufacturer. Each retailer's demand risk consists of two parts: a systematic risk part that affects all retailers and an idiosyncratic risk part that only has a local effect. We propose a macro prediction market to effectively elicit and aggregate useful information about systematic demand risk. We show that such information can be used to achieve accurate demand forecast sharing and better channel coordination …


Experimental And Empirical Perspectives On Grid Resource Allocation For The Singapore Market, Danny Oh, Steven Miller, Nan Hu Apr 2006

Experimental And Empirical Perspectives On Grid Resource Allocation For The Singapore Market, Danny Oh, Steven Miller, Nan Hu

Research Collection School Of Computing and Information Systems

In this paper, we describe our work on using the Tycoon system developed by HP Labs to provide a market-based resource allocation and bidding framework for a grid. We discuss how we intend to evaluate the feasibility of the Tycoon system by measuring its economic performance using agent-based simulation experiments for a particular type of grid usage scenario, namely, the digital media market scenario. We will also discuss a related effort in collecting and using real grid data from the National Grid Pilot Platform in Singapore and how we will be using real data collected to derive actual usage patterns …


Tacit Knowledge, Nonaka And Takeuchi Seci Model And Informal Knowledge Processes, Siu Loon Hoe Mar 2006

Tacit Knowledge, Nonaka And Takeuchi Seci Model And Informal Knowledge Processes, Siu Loon Hoe

Research Collection School Of Computing and Information Systems

The organizational behavior and knowledge management literature has devoted a lot attention on how structural knowledge processes enhance learning. There has been little emphasis on the informal knowledge processes and the construct remains undefined. The purpose of this paper is to highlight the importance of informal knowledge processes, propose a definition for these processes and link them to the socialization and internalization processes suggested by Nonaka and Takeuchi in the SECI model. The paper offers a fresh perspective on how informal knowledge processes in organizations help to enhance the organization’s learning capability. It will enable scholars and managers to have …


Managerial Assessments Of E-Business Investment Opportunities: A Field Study, Anandhi S. Bharadwaj, Amrit Tiwana Oct 2005

Managerial Assessments Of E-Business Investment Opportunities: A Field Study, Anandhi S. Bharadwaj, Amrit Tiwana

Research Collection School Of Computing and Information Systems

Managers charged with assessing investment opportunities for information technologies such as e-business projects face considerable uncertainty in their decision-making processes. Contemporary theories of the firm and the normative prescriptions thereof emphasize the potential for such investments to augment firm-level knowledge and relational capabilities. However, prior research has not examined the relative emphases that managers place on the knowledge and relational capability-augmenting characteristics of the e-business investments. In this paper, we develop a model to assess whether managerial evaluations of e-business investment opportunities are consistent with these normative and theoretical prescriptions. A test of the model using survey data on 485 …


Strategic Assessment Of Information Security Maturity, Arcot Desai Narasimhalu, Dayasindhu Nagarajan, Raghavan Subramanian Jul 2005

Strategic Assessment Of Information Security Maturity, Arcot Desai Narasimhalu, Dayasindhu Nagarajan, Raghavan Subramanian

Research Collection School Of Computing and Information Systems

CXOs are becoming increasingly interested in the information security maturity of their enterprises. This paper presents a CXO dashboard that will allow better management of the information security resources in an enterprise.


Leveraging Global Resources: A Distributed Process Maturity Framework For Software Product Development, Narayan Ramasubbu, M. S. Krishnan, Prasad Kompalli May 2005

Leveraging Global Resources: A Distributed Process Maturity Framework For Software Product Development, Narayan Ramasubbu, M. S. Krishnan, Prasad Kompalli

Research Collection School Of Computing and Information Systems

Distributed software development is pervasive in the software industry today as companies vie to leverage global resources. However, popular quality and process frameworks don?t specifically address the key processes needed for managing distributed software development. This practitioner-oriented, evolutionary process maturity framework for globally distributed software development features 24 new key process areas essential for managing distributed software product development and for continuously improving product management capabilities. An assessment survey helps practitioners implement the framework. In this article, the authors detail the framework and assessment survey, as well as report their experiences implementing the framework at a leading global firm. The …


Partnering For Perfection: An Economics Perspective On B2b Electronic Market Strategic Alliances, Qizhi Dai, Robert J. Kauffman Jan 2005

Partnering For Perfection: An Economics Perspective On B2b Electronic Market Strategic Alliances, Qizhi Dai, Robert J. Kauffman

Research Collection School Of Computing and Information Systems

New technological innovations have made it possible for new intermediaries to create value in business processes that involve the procurement of manufacturing and services supplies. Associated with these innovations is the emergence of business-to-business (B2B) electronic markets. These act as digital intermediaries that aim to reduce the transaction costs and mitigate the risks inherent in procurement. They improve buyers’ capabilities to search for attractive prices and also serve to increase the liquidity of sellers’ products. In this chapter, the authors explore the evolution of B2B e-market firms in terms of the strategies they employ to “perfect” their value propositions and …


Technology Competition And Optimal Investment Timing: A Real Options Perspective, Robert J. Kauffman, X. Li Jan 2005

Technology Competition And Optimal Investment Timing: A Real Options Perspective, Robert J. Kauffman, X. Li

Research Collection School Of Computing and Information Systems

Companies often choose to defer irreversible investments to maintain valuable managerial flexibility in an uncertain world. For some technology-intensive projects, technology uncertainty plays a dominant role in affecting investment timing. This article analyzes the investment timing strategy for a firm that is deciding about whether to adopt one or the other of two incompatible and competing technologies.We develop a continuous-time stochastic model that aids in the determination of optimal timing for managerial adoption within the framework of real options theory. The model captures the elements of the decision-making process in such a way so as to provide managerial guidance in …


Infosemm: Infosys It Security Maturity Model: A Report, Arcot Desai Narasimhalu, N. Dayasindhu, Raghavan Subramanian Jul 2004

Infosemm: Infosys It Security Maturity Model: A Report, Arcot Desai Narasimhalu, N. Dayasindhu, Raghavan Subramanian

Research Collection School Of Computing and Information Systems

Businesses are faced with a continuing battle related to cyber security related issues ranging from cyber attacks all the way to cyber (information) war. These issues affect result in information, system, reputation, and revenue related risks. These risks arise because of vulnerabilities introduced in three major parts of the enterprise – infrastructure, intelligence and practices. This report provides a rating system for representing the security health of enterprises.


Proprietary And Open Systems Adoption In E-Procurement: A Risk-Augmented Transactions Cost Perspective, Robert J. Kauffman, Hamid Mohtadi Jun 2004

Proprietary And Open Systems Adoption In E-Procurement: A Risk-Augmented Transactions Cost Perspective, Robert J. Kauffman, Hamid Mohtadi

Research Collection School Of Computing and Information Systems

We present an economic model that enables the study of incentives for business-to-business (B2B) e-procurement systems investments that permit inventory coordination and improved operational control. We focus on the information technology adoption behavior of firms in the presence of transaction costs, agency costs and information uncertainty. We conclude that it is appropriate to rethink the prior theory and develop an extended transaction-cost theory perspective that incorporates the possibility of shocks. We distinguish among three kinds of B2B e-procurement systems platforms. Proprietary platform procurement systems involve traditional electronic data interchange (EDI) technologies. Open platform procurement systems are associated with e-market Web …


A Cost-Effective Critical Path Approach For Service Priority Optimization In The Grid Computing Economy, Mei Lin, Zhangxi Lin Apr 2004

A Cost-Effective Critical Path Approach For Service Priority Optimization In The Grid Computing Economy, Mei Lin, Zhangxi Lin

Research Collection School Of Computing and Information Systems

The advancement in the utilization and technologiesof the Internet has led to the rapid growth of gridcomputing; and the perpetuating demand for gridcomputing resources calls for an incentive-compatible solution to the imminent QoS problem. This paper examines the optimal service priority selection problem that a grid computing network user will confront. We model grid services for a multi-subtask request as a prioritized PERT graph and prove that the localized conditional critical path, which is based on the cost-minimizin gpriority selection for each node, sets the lower bound for the length of cost-effective critical path that commits the optimal solution. We …


The Evolution Of Research On Information Systems: A Fiftieth Year Survey Of The Literature In Management Science, Rajiv D. Banker, Robert J. Kauffman Mar 2004

The Evolution Of Research On Information Systems: A Fiftieth Year Survey Of The Literature In Management Science, Rajiv D. Banker, Robert J. Kauffman

Research Collection School Of Computing and Information Systems

The development of the information systems (IS) literature in Management Science during the past 50 years reflects the inception, growth, and maturation of several different research streams. The five research streams we identify incorporate different definitions of the managerial problems that relate to IS, the alternate theoretical perspectives and different methodological paradigms to study them, and the levels of the organization at which their primary results impact managerial practice. The decision support and design science research stream studies the application of computers in decision support, control, and managerial decision making. The value of information research stream reflects relationships established based …


Viscors: A Visual-Content Recommender For The Mobile Web, Chan Young Kim, Jae Kyu Lee, Yoon Ho Cho, Deok Hwan Kim Jan 2004

Viscors: A Visual-Content Recommender For The Mobile Web, Chan Young Kim, Jae Kyu Lee, Yoon Ho Cho, Deok Hwan Kim

Research Collection School Of Computing and Information Systems

Current search methods for mobile-Web content can be frustrating to use. To shorten searches for cell phone wallpaper images, VISCORS combines collaborative filtering with content-based image retrieval. An increasing selection of content is becoming available in the mobile-Web environment, where users navigate the Web using wireless devices such as cell phones and PDAs. The fast growth and excellent prospects of the mobile-Web content market have attracted many content providers.


Modeling Product Development As A System Design Game, C. Jason Woodard Jun 2003

Modeling Product Development As A System Design Game, C. Jason Woodard

Research Collection School Of Computing and Information Systems

A system design game is a model of a situation in which agents’ actions determine the structure of a system, which in turn affects the system’s value and the share of value that each agent may capture through bargaining or market competition. This paper describes a class of games in which agents design interdependent products, for example software programs, which may be complements or substitutes for each other. These relationships are epresented by an object called a design structure network (DSN). Depending on the modeler’s choice of allocation rules, agents may benefit from owning critical nodes in the DSN, corresponding …


On The Strategy Of Supply Hubs For Cost Reduction And Responsiveness, Earl Barnes, Jim Dai, Shijie Deng, Doug Down, Mark Goh, Hoong Chuin Lau, Sharafali Moosa May 2003

On The Strategy Of Supply Hubs For Cost Reduction And Responsiveness, Earl Barnes, Jim Dai, Shijie Deng, Doug Down, Mark Goh, Hoong Chuin Lau, Sharafali Moosa

Research Collection School Of Computing and Information Systems

A supply hub is a location generally close to a manufacturer’s facility where all or some of its supplies are warehoused with the agreement that the materials will be paid for only when consumed. Supply hub is an innovative strategy employed by especially the electronics industry to achieve cost reduction and improved responsiveness. After first tracing the developments leading to the establishment of supply hubs, the paper then describes the dynamics of the operation of supply hubs. Case examples are provided to highlight the current practices. Finally, some research issues are identified.


Leadership Antecedents Of Informal Knowledge Acquisition And Dissemination, Siu Loon Hoe, Steve Mcshane Jul 2002

Leadership Antecedents Of Informal Knowledge Acquisition And Dissemination, Siu Loon Hoe, Steve Mcshane

Research Collection School Of Computing and Information Systems

Knowledge management is emerging as one of the leading influences on an organisation’s survival and competitive advantage (Blumentritt & Johnston 1999). Knowledge management is concerned with the effective acquisition, sharing, storage and utilisation of knowledge (Huber 1991; Saffady 1998). Corporate leaders are increasingly aware of the notion that an organisation’s long-term survival depends on its ability to generate new knowledge and continuously learn from the environment. The importance of a superior organisational learning capability as a source of competitive advantage is a common refrain among both managers and scholars (e.g. Kohli & Jaworski 1990; Nonaka 1991; Quinn 1992; Slater & …


Using Real Options Analysis For Evaluating Uncertain Investments In Information Technology: Insights From The Icis 2001 Debate, Paul P. Tallon, Robert J. Kauffman, Henry C. Lucas, Andrew B. Whinston, Kevin Zhu Jan 2002

Using Real Options Analysis For Evaluating Uncertain Investments In Information Technology: Insights From The Icis 2001 Debate, Paul P. Tallon, Robert J. Kauffman, Henry C. Lucas, Andrew B. Whinston, Kevin Zhu

Research Collection School Of Computing and Information Systems

Business and information systems (IS) executives continue to grapple with issues of risk and uncertainty in evaluating investments in information technology (IT). Despite the use of net present value (NPV) and other investment appraisal techniques, executives are often forced to rely on instinct when finalizing IT investment decisions. Recognizing the shortcomings of NPV, real options analysis has been suggested as an alternative approach, one that considers the risks associated with an investment while recognizing the ability of corporations to defer an investment until a later period or to make a partial investment instead. Responding to a growing interest in real …


Justifying Electronic Banking Network Expansion Using Real Option Pricing: An Empirical Illustration, Michel Benaroch, Robert J. Kauffman Jun 2000

Justifying Electronic Banking Network Expansion Using Real Option Pricing: An Empirical Illustration, Michel Benaroch, Robert J. Kauffman

Research Collection School Of Computing and Information Systems

The application of real options analysis to information technology investment evaluation problems recently has been proposed in the IS literature (Chalasani et al. 1997; Dos Santos 1991; Kambil et al. 1993; Kumar 1996; Taudes 1998). The research reported on in this paper illustrates the value of applying real options analysis in the context of a case study involving the deployment of point-of-sale (POS) debit services by the Yankee 24 shared electronic banking network of New England. In the course of so doing, the paper also attempts to operationalize real options analysis concepts by examining claimed strengths of this analysis approach …


On The Use Of The Complexity Index As A Measure Of Complexity In Activity Networks, Bert De Reyck, Willy Herroelen Jun 1996

On The Use Of The Complexity Index As A Measure Of Complexity In Activity Networks, Bert De Reyck, Willy Herroelen

Research Collection Lee Kong Chian School Of Business

A large number of optimal and suboptimal procedures have been developed for solving combinatorial problems modeled as activity networks. The need to differentiate between easy and hard problem instances and the interest in isolating the fundamental factors that determine the computing effort required by these procedures, inspired a number of researchers to develop various complexity measures. In this paper we investigate the relation between the hardness of a problem instance and the topological structure of its underlying network, as measured by the complexity index. We demonstrate through a series of experiments that the complexity index, defined as the minimum number …


Exceptions And Exception Handling In Computerized Information Processes, Diane M. Strong, Steven M. Miller Apr 1995

Exceptions And Exception Handling In Computerized Information Processes, Diane M. Strong, Steven M. Miller

Research Collection School Of Computing and Information Systems

Exceptions, situations that cannot be correctly processed by computer systems, occur frequently in computer-based information processes. Five perspectives on exceptions provide insights into why exceptions occur and how they might be eliminated or more efficiently handled. We investigate these perspectives using an in-depth study of an operating information process that has frequent exceptions. Our results support the use of a total quality management (TQM) approach of eliminating exceptions for some exceptions, in particular, those caused by computer systems that are poor matches to organizational processes. However, some exceptions are explained better by a political system perspective of conflicting goals between …


Managing Risks In Information Technology Projects, Boon Siong Neo, Kwong Sin Leong Jan 1994

Managing Risks In Information Technology Projects, Boon Siong Neo, Kwong Sin Leong

Research Collection School Of Accountancy

The development and implementation of IT (Information Technology) projects are plagued with problems of cost and time overruns. technical inadequacy, inability to meet user requirements. lack of utilization. and failure to achieve anticipated benefits. These problems occur to some projects and not to others because I) IT projects have different profiles of risk. and 2) IT project risks have been managed more or less effectively. This paper synthesizes the literature into four classes of risks. and applies it to evaluate TradeNet. an EDLbased trading system implemented in Singapore in I989. Through a case study of TradeNet. we derived a typology …


Deterministic Approximations To Co-Production Problems With Service Constraints And Random Yields, Gabriel R. Bitran, Thin Yin Leong May 1992

Deterministic Approximations To Co-Production Problems With Service Constraints And Random Yields, Gabriel R. Bitran, Thin Yin Leong

Research Collection School Of Computing and Information Systems

Production planning problems where multiple item categories are produced simultaneously are examined. The items have random yields and are used to satisfy the demands of many products. These products have specification requirements that overlap. An item originally targeted to satisfy the demand of one product may be used to satisfy the demand of other products when it conforms to their specifications. Customers' demand must be satisfied from inventory. The problem is formulated with service constraints and a near-optimal solution is provided to the problem with a fixed planning horizon. Simple heuristics are proposed for the problem solved with a rolling …


Reuse And Productivity In Integrated Computer-Aided Software Engineering: An Empirical Study, Rajiv D. Banker, Robert J. Kauffman Sep 1991

Reuse And Productivity In Integrated Computer-Aided Software Engineering: An Empirical Study, Rajiv D. Banker, Robert J. Kauffman

Research Collection School Of Computing and Information Systems

Growing competition in the investment banking industry has given rise to increasing demand for high functionality software applications that can be developed in a short period of time. Yet delivering such applications creates a bottleneck in software development activities. This dilemma can be addressed when firms shift to development methods that emphasize software reusability. This article examines the productivity implications of object and repository-based integrated computer-aided software engineering (ICASE) software development in the context of a major investment bank's information systems strategy. The strategy emphasizes software reusability. Our empirical results, based on data from 20 projects that delivered software for …


Parameter Non-Stationarity In A Model To Estimate The Business Value Of Information Technology, Robert J. Kauffman Apr 1989

Parameter Non-Stationarity In A Model To Estimate The Business Value Of Information Technology, Robert J. Kauffman

Research Collection School Of Computing and Information Systems

Developing robust and refined measures to quantify strategic impacts is a major challenge facing researchers who seek to improve methods for IT investment evaluation. This paper presents a means to test for parameter "non-stationarity" in a model which quantifies the strategic contribution of IT. An iterative "jackknife" procedure is used to diagnose if different local competitive and demographic conditions present in branch banking enhance or suppress leverage on deposit market share associated with membership in an ATM network. Preliminary results suggest this approach will be useful for managers who need to evaluate similar ITs which operate in different environments.