9 research outputs found

    In Free-Float: How Decision Analytics Paves the Way for the Carsharing Revolution

    Get PDF
    Free-floating carsharing is a young and rapidly expanding market that allows customers to end their rentals anywhere within the business area of the provider. Through this flexibility it complements public transportation and reduces the environmental footprint of the transportation sector. We present a novel data analytics methodology that supports companies – from local start-ups to global players – in maneuvering this constantly growing and changing market environment. Using a large set of rental data, we derive indicators for the attractiveness of certain areas based on points of interest in their vicinity, such as shopping malls, movie theaters, or train stations. In a case study of Berlin we use these indicators to accurately identify promising regions for an expansion of the business area. However, the methodology introduced in this paper can also improve operational decisions of the service provider and is applicable to a wide range of other location-based services

    Uncovering the nature of the relationship between outsourcing motivations and the degree of outsourcing: An empirical study on Finnish small and medium-sized enterprises

    Get PDF
    Prior literature has identified several outsourcing motivations, such as cost reduction and access to expertise, and deciphered the influence of these variables on outsourcing decisions. In another stream of outsourcing studies, researchers have gauged the degree of outsourcing, unearthing how companies may choose to outsource a set or processes instead of the whole business function. In this article, we draw on both of these streams of outsourcing research to study the relationship between outsourcing motivations and the degree of outsourcing within a particular business function. We probe the effect of nine motivation items on outsourcing decision through an empirical study using survey data gathered from 337 small and medium-sized enterprises. We find that cost reduction, a focus on core competence and business/process improvements are all associated with a higher degree of outsourcing, but interestingly, access to expertise is negatively associated with the degree of outsourcing. This finding suggests that companies that outsource mainly to acquire external expertise outsource only a limited number of processes within a specific business function. Our main theoretical contribution lies in uncovering the dynamic nature of outsourcing motivations, meaning that as companies outsource a larger degree of their business processes, some motivation items become more accentuated and others fade in importance

    Experience Me! The Impact of Content Sampling Strategies on the Marketing of Digital Entertainment Goods

    Get PDF
    Singapore National Research Foundation under International Research Centre @ Singapore Funding Initiativ

    Predicting Software Revision Outcomes on Github Using Structural Holes Theory

    Get PDF
    Many software repositories are hosted publicly online via social platforms. Online users contribute to the software projects not only by providing feedback and suggestions, but also by submitting revisions to improve the software quality. This study takes a close look at revisions and examines the impact of social media networks on the revision outcome. A novel approach with a mix of different research methods (e.g., ego-centric social network analysis, structural holes theory and survival analysis) is used to build a comprehensible model to predict the revision outcome. The predictive performance is validated using real life datasets obtained from GitHub, the social coding website, which contains 32,962 pull requests to submit revisions, 20,399 distinctive software project repositories, and a social network of 234,322 users. Good predictive performance has been achieved with an average AUC of 0.84. The results suggest that a repository host's position in the ego network plays an important role in determining the duration before a revision is accepted. Specifically, hosts that are positioned in between densely connected social groups are likely to respond more quickly to accept the revisions. The study demonstrates that online social networks are vital to software development and advances the understanding of collaboration in software development research. The proposed method can be applied to support decision making in software development to forecast revision duration. The result also has several implications for managing project collaboration using social media

    Improving the Understanding of Electrical Vehicle Technology and Policy Diffusion across Countries

    Get PDF
    The transport sector is particularly difficult to decarbonize. Use of electric vehicles (EV)—a potentially transformative and sustainable transport technology—can reduce greenhouse gas emissions, domestic fossil fuel demand, energy import dependency, and air pollution. Policies play an important role in the diffusion of new technologies, such as EVs, principally in their formative stage as they compete with an incumbent technology. However, great discrepancies exist across countries regarding EV support and uptake. EV diffusion is conceptualized as an outcome of policy diffusion based on national characteristics and international mechanisms. This study aims to explain the variation in EV policy diffusion across countries, by conducting an event history analysis on EV diffusion (EVs > 1% market share) between 2010 and 2017, using a sample of 60 countries. It identifies characteristics and mechanisms relevant to the novel technology's "formative phase”, focusing on the formation of state goals, international diffusion, and local technology adoption and deployment. The empirical contribution lies in identifying and validating socioeconomic and political factors and the international mechanisms influencing a country's position on the diffusion curve. This can help improve scenarios via better reflecting EV diffusion

    Decision modeling and empirical analysis of mobile financial services

    Get PDF

    Legal and policy aspects to consider when providing information security in the corporate environment

    Get PDF
    E-commerce is growing rapidly due to the massive usage of the Internet to conduct commercial transactions. This growth has presented both customers and merchants with many advantages. However, one of the challenges in E-commerce is information security. In order to mitigate e-crime, the South African government promulgated laws that contain information security legal aspects that should be integrated into the establishment of information security. Although several authors have written about legal and policy aspects regarding information security in the South African context, it has not yet been explained how these aspects are used in the provision of information security in the South African corporate environment. This is the premise upon which the study was undertaken. Forty-five South African organisations participated in this research. Data gathering methods included individual interviews, website analysis, and document analysis. The findings of this study indicate that most organisations in South Africa are not integrating legal aspects into their information security policies. One of the most important outcomes of this study is the proposed Concept Model of Legal Compliance in the Corporate Environment. This Concept Model embodies the contribution of this study and demonstrates how legal requirements can be incorporated into information security endeavours. The fact that the proposed Concept Model is technology-independent and that it can be implemented in a real corporate environment, regardless of the organisation’s governance and management structure, holds great promise for the future of information security in South Africa and abroad. Furthermore, this thesis has generated a topology for linking legislation to the provision of information security which can be used by any academic or practitioner who intends to implement information security measures in line with the provisions of the law. It is on the basis of this premise that practitioners can, to some extent, construe that the integration of legislation into information security policies can be done in other South African organisations that did not participate in this study. Although this study has yielded theoretical, methodological and practical contributions, there is, in reality, more research work to be done in this area.School of ComputingD. Phil. (Information Systems
    corecore