56 research outputs found

    The Digital Persona and Trust Bank: A Privacy Management Framework

    Get PDF
    Recently, the government of India embarked on an ambitious project of designing and deploying the Integrated National Agricultural Resources Information System (INARIS) data warehouse for the agricultural sector. The system’s purpose is to support macro level planning. This paper presents some of the challenges faced in designing the data warehouse, specifically dimensional and deployment challenges of the warehouse. We also present some early user evaluations of the warehouse. Governmental data warehouse implementations are rare, especially at the national level. Furthermore, the motivations are significantly different from private sectors. Designing the INARIS agricultural data warehouse posed unique and significant challenges because, traditionally, the collection and dissemination of information are localized

    Supply chain disruption propagation: a systemic risk and normal accident theory perspective

    Get PDF
    When a disruption occurs in a firm, its effects are often felt throughout the supply chain. As supply chains expand globally and companies pursue velocity and efficiency, the probability of disruptions propagating throughout a chain grows. In this paper, we employ a qualitative, grounded theory case study approach to help understand what drives supply chain disruption propagation and to provide theoretical insights into this emerging area. For a more complete perspective, we study three interconnected tiers in seven unique supply chains. Each supply chain triad consists of (1) a focal firm (a manufacturer), (2) a supplier to the focal firm and (3) a customer of the focal firm allowing us to gain perspective from three levels in multiple supply chains. Three aggregate dimensions are defined which help explain the propagation of supply chain disruptions: the nature of the disruption, structure and dependence, and managerial decision-making. Within these dimensions, six themes are identified giving an increased level of granularity into disruption propagation: correlation of risk, compounding effects, cyclical linkages, counterparty risk, herding and misaligned incentives. Organisations should consider these themes and their interactions to effectively deal with supply chain disruptions

    The economic impact of public beta testing: the power of word-of-mouth

    Get PDF
    The advent of the Internet has brought many fundamental changes to the way business is conducted. Among others, a growing number of software firms are relying on public beta testing to improve the quality of their products before release. While the benefits resulting from improved software reliability have been widely recognized, the influences of public beta testers on the diffusion of a new software product have not been documented. Through their word-of-mouth effect, public beta testers can speed up the diffusion of a software product after release, and hence increase the time-discounted revenue per adopter. In this research, we take into consideration both the reliability-side and the diffusion-side of the benefits, and develop methodologies to help firms decide the optimal number of public beta testers and the optimal duration of public beta testing. Numerical results show the firm’s profit can increase substantially by taking advantage of the world-of-mouth of public beta testers. This benefit is more significant if firms recruit beta testers from those who can benefit from a software product but cannot afford it

    Privacy Concerns regarding Wearable IoT Devices: How it is Influenced by GDPR?

    Get PDF
    Internet of Things (IoT) devices have implications for health and fitness. Fitness wearables can promote healthy behavior and improve an individual’s overall health and quality of life. Even though fitness wearables have various benefits, privacy concerns regarding the data collected remain as a major barrier to adoption of fitness wearables. Intrinsic factors like disposition to value privacy and extrinsic factors like privacy policies and General Data Protection Regulation (GDPR) can influence users’ privacy concerns. This research uses experimental design to understand how these factors influence privacy concerns. The results suggest that GDPR reduces the average privacy concerns of users. The study also shows that higher perception of effectiveness of privacy policy reduces the perception of privacy risks and increases the perception of privacy control. This study illustrates the effect of users’ perceptions on factors like privacy policy, privacy control and GDPR on mitigating privacy concerns

    A Brief History of the Midwest Association for Information Systems: 2005-2020

    Get PDF
    The Midwest Association for Information Systems (MWAIS), founded in 2005, was recognized as an outstanding chapter of the Association for Information Systems (AIS) for all five years of the award (2014, 2015, 2016, 2017, and 2018). MWAIS continues to grow and serve academics in the Midwest and the surrounding region through annual conferences, meetings and receptions at national and international conferences, and through its journal, Journal of the Midwest Association for Information Systems (JMWAIS). This article briefly describes the impetus and actors instrumental in the creation of the association and the current state of MWAIS, its conferences, and the journal

    An evidence-based management framework for business analytics

    Get PDF
    It is said that knowledge is power, yet often, decision makers ignore information that ought to be considered. The phenomenon known as Semmelweis reflex occurs when new knowledge is rejected because it contradicts established norms. The goal of evidence-based management (EBMgt) is to help overcome Semmelweis reflex by integrating evaluated external evidence with stakeholder preference, practitioner experiences, and context. This evaluated external evidence is the product of scientific research. In this paper, we demonstrate an EBMgt business analytics model that uses computer simulation to provide scientific evidence to help decision makers evaluate equipment replacement problems, specifically the parallel machine replacement problem. The business analytics application is demonstrated in the form of a fleet management problem for a state transportation agency. The resulting analysis uses real-world data allowing decision makers to unfreeze their current system, move to a new state, and re-freeze a new system

    Influencing organizational commitment through office redesign

    Get PDF
    Prior research on the effects of office redesign on work-related outcomes has been largely atheoretical and yielded mixed and conflicting findings. Expanding on individual reactions to office design changes as specified by social interference theory, we propose that office redesign affects organizational commitment and this relationship is mediated by employee perceptions of the broader work environment. This conceptual model is tested using 121 financial services employees who experience office redesign and 136 who do not. Results indicate that perceptions of innovation and collaboration mediate the effects of office redesign over and above negative personal reactions such that affective organizational commitment is enhanced among those experiencing reconfigured offices. Findings provide support for an expanded rendition of social interference theory that provides for favorable (as well as unfavorable) employee reactions to office redesign. Such a theoretical explanation is asserted to increase understanding of how the physical environment influences employee attitudes

    Creating Offshore-ready IT Professionals: A global perspective and strong collaborative skills are needed

    Get PDF
    Outsourcing of IT functions has become a widespread corporate practice, which has naturally led to concerns among IT works about how this affects their jobs. The issue is complex, and many companies are bringing their IT functions back inhouse. In light of this complexity, what skills do IT workers need to be com-petitive? We address this question first by reviewing the literature and then by examining two corporate case studies that have dealt with outsourcing issues. Based on this view of outsourcing, we discuss the skills that can provide a com-petitive advantage in the current environment

    Software Implementation using Hardware-Based Verification for Secure Content Delivery

    Get PDF
    This paper presents a novel method for secure message transmission – the Software Implementation using Hardware-Based Verification for Secure Content Delivery (SIHBVSCD) method. This method incorporates a two-tier security protocol which allows messages to be verified at both the user level (coming from a particular user) and hardware level (originating from a particular machine) providing protection from espionage and/or clandestine manipulation of information. SIHBVSCD securely sets up a one-time symmetric key used for transmission, offering advantages over both the high theft/loss likelihood of smartcards and the inability of hardware-based verification for machines that do not contain hardware capable of remote attestation

    Supply Chain Network Robustness Against Disruptions: Topological Analysis, Measurement, and Optimization

    Get PDF
    This paper focuses on understanding the robustness of a supply network in the face of a disruption. We propose a decision support system for analyzing the robustness of supply chain networks against disruptions using topological analysis, performance measurement relevant to a supply chain context and an optimization for increasing supply network performance. The topology of a supply chain network has considerable implications for its robustness in the presence of disruptions. The system allows decision makers to evaluate topologies of their supply chain networks in a variety of disruption scenarios, thereby proactively managing the supply chain network to understand vulnerabilities of the network before a disruption occurs. Our system calculates performance measurements for a supply chain network in the face of disruptions and provides both topological metrics (through network analysis) and operational metrics (through an optimization model). Through an example application, we evaluate the impact of random and targeted disruptions on the robustness of a supply chain network
    corecore