The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper focuses on the educational research/knowledge management problem of sharing and reuse of teaching practices in an emerging business analytics discipline. Our research context is the Teradata University Network (TUN) community -- the leading worldwide community of university and industry members in the field of business intelligence/business analytics. This research aims to investigate the...
The Great East Japan Earthquake on March 11th, 2011 caused severe damage to the northern coast of the main island in Japan. Since then we have been working to help out the affected area in terms of IT support such as internetworking and providing PCs. Through our support activities we came across an interesting issue concerning collaboration with people from heterogeneous backgrounds. We call this...
Due to future markets shifts as well as current market dynamics industries like the automotive industry OEMs have to be able to handle both exploration and exploitation simultaneously, a capability which is called 'organizational ambidexterity'. Using data from German and Austrian premium OEMs as well as leading-edge suppliers of the automotive industry present work sheds light on the questions what...
Application stores have played a crucial role in the proliferation of applications for smart phones and other mobile devices. However, web-based mobile applications are challenging the application store model by allowing developers to directly reach the end users. These web-based applications are enhanced by the HTML5 standard, which provides additional capabilities for the use of developers and brings...
This paper presents a case study on the use of mobile digital services through smart phones to enhance known value chains by increasing the lateral margin value of services in the charity industry. Based on empirical data gathered from research, surveys and interviews, detailed recommendations and considerations for the design of mobile digital services are discussed: location services, in particular,...
Once a retail sector understands the reasons driving customers to join a line in front of the door, that company might adopt marketing strategies targeting waiting customers. Restated, the reasons causing a customer to wait for a service are important. This investigation developed a questionnaire for surveying customer wait experiences. The reasons of customer behaviors associated with waiting were...
Adoption processes in network effect markets -- like the ICT industry -- often lead to so-called "lock-ins" which means that one single standard or technology gets adopted by almost all market participants. Based on the work of Arthur [1] we present a simulation based model explaining a market's tendency to lock-in by means of two factors: the strength of network effects and the network...
Successful joint industry-university projects are as rewarding as they are rare. Even more rare is the effective transfer of technology from an academic research laboratory to an industrial application. Having the transfer take less than 3 years is rarest of all. This paper describes a case study where a successful joint industry-university project resulted in a considerable reduction in the time...
The insider threat continues to be one of the prime security concerns of government and industry organizations. The topic is perceived by senior organizational leadership as one of the most significant and difficult to mitigate security vulnerabilities. The threat from insider activity can be broadly defined as threats introduced to an organization by a trusted entity. This definition encompasses...
Social media tools are used by firms to create and capture business value. In this study, we synthesize emerging literature on social commerce, social media, and the diffusion of innovation to identify the role that organizational, managerial and environmental characteristics of SMEs play in the adoption of Twitter. To test the model, we administered a survey to 453 SME mangers from the United States,...
In recent years, a large number of healthcare organisations have adopted information systems to improve their operations. An analysis of the existing literature shows that there is little concrete understanding about information systemsâ impact within the healthcare context. This study aims to improve the current understanding in the field by conducting an in-depth, exploratory study of...
Thousands of U.S. physicians have reached the first stage of "meaningful use" and received incentive payments through the HITECH Act. Yet doubts have surfaced about the sustainability of EHR diffusion, as well as about which providers will benefit from program incentives. In this paper we report the findings of a survey conducted among Hawaii physicians, in which we assessed the views of...
The digitization is posing great challenges to the European book industry. While some national markets show a fair diffusion of electronic book (ebook) technology, others are still resisting the digital trend. The lack of differentiated knowledge about the reasons for individual differences in ebook acceptance brings about uncertainties for industry players such as publishers or retailers. Technology...
This paper examines how advertisers react to the complex competitive environment in sponsored search auctions considering two salient competitive features: rank externality where the payoff of a rank position to an advertiser depends on which specific advertisers are located in other ranks, and competitor heterogeneity where diverse advertisers of different types may be competing for the same search...
Cloud computing probably carries disruptive innovations that will change our future in many ways. We explore in this article how R&D Tax Credit changes the cost metrics of cloud computing with short- and long-term effects of its future developments and acceptance as a new key technology. Some of the situations described here may be in effect or arise in some other countries but in-depth analysis...
In this paper, we identify challenges of involving different stakeholders in distributed co-creative open innovation processes and discuss how these challenges can be managed. In the Loco Media project, researchers, newspaper representatives and readers/users have co-created innovative user generated content (UGC) services. Using a Living Lab approach with the user in focus in a real life setting,...
This study aims to look beyond the quantitative summary to provide a more comprehensive view of online user-generated content. We obtain a unique and extensive dataset of online user reviews for hotels across various review sites and over a long time periods. We use the sentiment analysis technique to decompose user reviews into five dimensions to measure hotel service quality. Those dimensions are...
Knowledge has been recognized as a critical asset for companies that want to compete in today's turbulent business environment. Researchers and practitioners recognize that the loss of knowledge due to loss of employees that hold valuable knowledge can have grave consequences to an organization. This paper provides a methodology for assessing potential risk of losing knowledge when employees retire...
Shared experience (i.e., experience working together) among project team members is known to affect a project team's performance. Yet, little is known of whether the effects of shared experience homogeneous. We empirically find that the effects of shared experience on a project's performance vary by the outcome of shared experience (e.g., successful vs. unsuccessful) as well as project team role (e...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.