1,708 research outputs found
Conjunctival scanning for biometric identification
Researchers at UMKC have developed a biometric device which recognizes the physical characteristics of sclera veins which are visible through the conjunctival membrane in the human eye. The vascular structures of the conjunctiva and episclera are rich with specific details that are useful in identifying individuals. Unlike retinal scans, the vascular structures of the conjunctiva and episclera provide extensive and unique information that can be obtained from various and selected regions of the eye and processed to authenticate or identify individuals. The technology can work with less light, on non-compliant targets, and from much greater distances than currently employed methods. It can function as a stand-alone biometric or could be used in conjunction with exiting ocular-based biometrics to achieve enhanced performance and spoof-proofing. Potential Areas of Applications: * Airport /border security * Law enforcement * Casinos * Private security Patent Status: U.S. Patent no. 7,327,860 Inventor(s): Reza Derakhshani; Arun Ross Contact Info: 0James Brazeal - [email protected] (816) 235-509
Trade-offs in Organizational Architecture: Information Systems, Incentives and Work Design
Information Systems Working Papers Serie
Information Systems, Incentives and Workflow Logic: Strategic Implications for Reengineering Business Processes
We use a series of case studies to motivate the analysis of the organizational impact and performance associated with information systems and workflow design topologies. Our study places a special emphasis on processes involving information intensive tasks that require information sharing and extended information access. The role of various information technologies is examined in the light of their effects on process workflows, worker incentives and worker performance. Our analytical research framework incorporates the effects of queuing lead times, incentives, data sharing and the consolidation of tasks. We show that the following task attributes β information intensity, skill requirements, specifications variability, and technology returns β have a critical role in the success of process redesign. We prove that technology that streamlines information flows not only improves job control, but can also reduce the cost of incentive compensation. Our results also explain why, under certain circumstances, information technology investments and enhanced worker incentives are substitutable. We conclude with several managerial guidelines for process redesign
Building and Sustaining Interorganizational Information Sharing Relationships: The Competitive Impact of Interfacing Supply Chain Operations with Marketing Strategy
Information technology has radically altered the management of supply chain operations; many business partners
who are adjacent on the supply chain can gain from entering inter-organizational information sharing (IOIS)
relationships and sharing information that was previously accessible to only one of them. This situation is typical in
retailer-supplier logistics management relationships. The first part of our study analyzes different forms of virtual
integration - relationships between independent companies that result in some of their operations resembling those
of a single vertically integrated firm - and classifies them based on their models of information sharing across the
supply chain. We find that there are four primary policies that firms adopt when they exchange information across
the supply chain; these are EDI, vendor managed inventory (VMI), continuous replenishment (CR) and category
management (CM).
Typically, corporations view the development of inter-organizational information systems, and the sharing of
information as being targeted at increasing operational efficiency by reducing ordering costs, inventory costs and
supply lead times. Many studies have focused on studying IOIS technology issues, and estimating the value
generated from these arrangements using traditional models of inventory and ordering costs. However, we find that
in a number of cases, the information shared can have cross-functional value - it can also be used to improve a
supplier's production planning, and to alter their marketing and sales strategies. Paradoxically, however, suppliers
who receive such information feel that not only are their benefits minimal, but they often end up worse off than
before the IOIS was implemented.
The second part of our study explains this paradox. We show how retailers and other buyers can successfully
contract to end up with more value than is generated by the sharing of information. Using game-theoretic models of
strategic interaction, we show that this effect intensifies as the competitive value of the information to the supplier's
marketing and sales departments increases. Besides, as the value that could be generated by the sales and production
divisions of the supplier increases, we demonstrate how the supplier loses more and more value. Furthermore, the
buyer need not actually share the information to derive these rents; we indicate why the possibility of sharing is
sufficient, even when the buyer cannot independently create value from that information.
The practical contributions of this inter-disciplinary study are manifold. We provide a clear and lucid description of
the different levels at which organizations share information. We also describe a fairly general modeling framework
which lays the foundation for a deeper analysis of this increasingly important area. Our strategic results demonstrate
that a single focus on the technological or operational aspects of IOIS can mislead managers significantly. The true
costs and benefits of these relationships can only be judged by recognizing the cross-functional impact of the
information flows on the operational architecture, the marketing strategies of the suppliers and buyers, and the
nature of competition within the respective organizations' industries.Information Systems Working Papers Serie
- β¦