3,448 research outputs found
Customer Cybersecurity and Supplier Cost Management Strategy
In this paper, we explore the spillover effect of customer firms’ data breaches on their upstream supplier firms’ cost management strategies, proxied by cost stickiness. Our primary analyses suggest that data breaches suffered by customer firms are associated with a decrease in cost stickiness among supplier firms. Furthermore, the reductions in supplier cost stickiness are stronger if suppliers are managed by CEOs from national cultural groups with high uncertainty avoidance, low long-term orientations, and/or low individualism. In sum, the findings contribute to both Information Systems (IS) and Operations Management (OM) disciplines in terms of data breach, cost management strategy, and the role of national culture in OM. In particular, the findings can facilitate the management and regulation of data breaches for managers and regulators
The asymptotic behavior of rarely visited edges of the simple random walk
In this paper, we study the asymptotic behavior of the number of rarely
visited edges (i.e., edges that visited only once) of a simple symmetric random
walk on . Let be the number of rarely visited edges up
to time . First, we evaluate , show that is non-decreasing in and that
. Then we study the
asymptotic behavior of for any and
use it to show that there exists a constant such that
almost surely
2-[(3R,6R)-6-Methyl-2,5-dioxomorpholin-3-yl]-N-(propan-2-yl)acetamide
The molecular conformation of the title compound, C10H16N2O4, is determined by an intramolecular N—H⋯O hydrogen bond involving the morpholine NH group and the amide O atom. In the crystal, molecules are linked by N—H⋯O hydrogen bonds into chains along the a-axis direction
- …