{"title":"Evaluating the applicability of socially-oriented perspectives to the IT service level agreement negotiation process: a theory-driven exploratory study","authors":"Daniel S. Soper, H. Demirkan, M. Goul","doi":"10.1504/IJSSCI.2008.021766","DOIUrl":"https://doi.org/10.1504/IJSSCI.2008.021766","url":null,"abstract":"Continuing exponential growth in the Information Technology (IT) outsourcing market implies a need to understand the negotiated Service Level Agreements (SLAs) that underlie the majority of those sourcing relationships. Knowledge of the negotiation processes that are associated with the development of IT SLAs is a necessary precondition for designing and developing Negotiation Support Systems (NSSs) intended to support those processes. To gain such knowledge, it is first necessary to identify theoretical perspectives that may be relevant to the IT SLA negotiation process, postulate reasonable propositions therefrom, and then evaluate those propositions in a practical, exploratory fashion. Accordingly, the current paper draws on socially-oriented perspectives to develop theory-driven propositions which are then evaluated in an experimental setting. The results of this study indicate that several socially-oriented theories may be relevant to the IT SLA negotiation process, and represent a starting point for the identification of context-specific IT SLA negotiation support systems.","PeriodicalId":365774,"journal":{"name":"International Journal of Services Sciences","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125875443","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Value-at-risk in service-oriented systems: a framework for managing a vendor's portfolio uncertainties","authors":"R. Kauffman, Ryan Sougstad","doi":"10.1504/IJSSCI.2008.021764","DOIUrl":"https://doi.org/10.1504/IJSSCI.2008.021764","url":null,"abstract":"We present a method for analysing a vendor's exposure to uncertainties in IT services. These uncertainties arise in project portfolios with projects whose value covaries with managerial decisions about firm strategy, technology standards and platforms to be used. Past research involving information systems (IS) decision-making under uncertainty has focused on real options methods which inform a priori investment decisions. We explore methodologies associated with asset valuation theory in financial economics called value-at-risk (VaR), which measures the worst expected loss over a time horizon under normal market conditions at a given confidence interval. We show that VaR analysis informs management on how to leverage existing capabilities and risk exposures to inform the IT sourcing decision and ongoing IT services risk management. We explore information requirements, outcomes and limitations for VaR. We also present an evaluative framework to help a senior manager to bring these concepts into use in a real-world organisation.","PeriodicalId":365774,"journal":{"name":"International Journal of Services Sciences","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130557283","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Statistical machine learning for network intrusion detection: a data quality perspective","authors":"E. Lauría, G. Tayi","doi":"10.1504/IJSSCI.2008.019611","DOIUrl":"https://doi.org/10.1504/IJSSCI.2008.019611","url":null,"abstract":"In this paper, we present our research in applying statistical machine learning methods for network intrusion detection. With the advent of online distributed services, the issue of preventing network intrusion and other forms of information security failures is gaining prominence. In this work, we use two different algorithms for classification (decision trees and naive Bayes classifier) to build predictive models capable of distinguishing between 'bad' TCP/IP connections, called intrusions attacks, and 'good' normal TCP/IP connections. We investigate the effect of training the models using both clean and dirty data. The goal is to analyse the predictive power of network intrusion classification models trained with data of varying quality. The classifiers are contrasted with a clustering-based approach for comparison purposes.","PeriodicalId":365774,"journal":{"name":"International Journal of Services Sciences","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130558237","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Supply chain management in fashion and textile industry","authors":"P. Hilletofth, O. Hilmola","doi":"10.1504/IJSSCI.2008.019608","DOIUrl":"https://doi.org/10.1504/IJSSCI.2008.019608","url":null,"abstract":"In fashion and textile business, the demand changes rapidly due to fashion trends and a volatile market situation. This demand is unpredictable and could vary and change completely in a short time, creating high difficulties for supply chain. To create a leagil (lean and agile) supply chain is one observed way for a fashion and textile retailing company to optimise its performance and to remain competitive. One good example from such is fashion retailer Zara, which has adopted leagile approach and combined this with key success factors for fashion retailing. However, in this paper, we argue that the leagile approach is not a universal solution in the fashion and textile business. For some fashion and textile companies, the lean approach is more adequate. Case study findings and simulation results reveal that the lean and leagile approach could coexist as different strategy alternatives – simulation results favour leagile strategy, while five year profitability analysis shows lean apparel retailer H&M to have higher profitability than Zara.","PeriodicalId":365774,"journal":{"name":"International Journal of Services Sciences","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133668575","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A new algorithm of inventory classification based on the association rules","authors":"I. Kaku, Yiyong Xiao","doi":"10.1504/IJSSCI.2008.019609","DOIUrl":"https://doi.org/10.1504/IJSSCI.2008.019609","url":null,"abstract":"Today, engineering science and information technologies have given us powerful computational tools to support production planning and inventory control. In history, the ABC classification is usually used for inventory items aggregation because the number of inventory items is so large that it is not computationally feasible to set stock and service control guidelines for each individual item. A fundamental principle in ABC classification is that, ranking all inventory items with respect to a notion of profit based on historical transactions. The difficulty is that the profit of one item not only comes from its own sales, but also from its influence on the sales of other items, that is, the 'cross-selling effect'. In this paper a new algorithm of inventory classification based on the association rules is presented. By using the Support-Confidence framework the consideration of cross-selling effect is introduced to generate a new criterion that is then used to rank inventory items. A numeral example is used to explain the new algorithm and empirical experiments are implemented to evaluate its effectiveness and utility.","PeriodicalId":365774,"journal":{"name":"International Journal of Services Sciences","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122042578","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The modified theory of planned behaviour applied to e-government service acceptance","authors":"Hao-Erl Yang, Yung-Hsin Wang","doi":"10.1504/IJSSCI.2008.019607","DOIUrl":"https://doi.org/10.1504/IJSSCI.2008.019607","url":null,"abstract":"This paper employed the modified Theory of Planned Behaviour (TPB) model as a conceptual framework to assess the effects of three key beliefs of TPB: attitude, subjective norm and behavioural control, on e-government service acceptance and explain adopters' behavioural intention. Structural Equation Modelling (SEM) was applied to analyse a set of empirical data and the results show that attitude and behavioural control have significant effects on adopters' behavioural intention, which are consistent with past research both on IS product and e-commerce service. Although we found a significant indirect effect of subjective norm on intention from a competing model including interdependency terms between these three beliefs, the importance of subjective norm in the model needs further research to assess. This finding may partially make clear the important role of subjective norm in the modified TPB model in explaining the e-government acceptance behaviour.","PeriodicalId":365774,"journal":{"name":"International Journal of Services Sciences","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124497399","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Archetypes of collective yield curve movements","authors":"D. Dersch","doi":"10.1504/IJSSCI.2008.019606","DOIUrl":"https://doi.org/10.1504/IJSSCI.2008.019606","url":null,"abstract":"We examine the historical behaviour of interest rate movements in seven major currencies AUD, CAD, CHF, EUR, GBP, JPY and USD. We apply principle components analysis and hierarchical cluster analysis to illustrate, understand and model the past collective movements of yield curves. We show that simple correlations are not able to capture the complex behaviour observed in the data set. In order to model risk factors that are intimately connected, we propose so-called archetypes of collective movements as building blocks. Thus, we start from collective movements that are coherent from a historical perspective. A set of risk factor forecasts is then generated by adapting an archetype rather than building single risk factor forecasts from scratch. This approach opens the door to integrated, coherent forecasts created from complex building blocks. The methods may be applied within scenario simulations, forecasting, filtering techniques and technical analysis.","PeriodicalId":365774,"journal":{"name":"International Journal of Services Sciences","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129760973","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Beyond distribution and assignment: managing navy careers","authors":"N. K. Womer","doi":"10.1504/IJSSCI.2008.01961","DOIUrl":"https://doi.org/10.1504/IJSSCI.2008.01961","url":null,"abstract":"Numerous studies have attempted to provide technological solutions to the problem of sailor distribution and assignment. But they have failed to model the roles of several stakeholders. This paper aims to provide timely technical support and relevant information to the stakeholders. The approach is to model a sailor's sequence of jobs as a supply chain. The contribution of this effort is to introduce supply chain management as a way of thinking about the problem. Each command receives a sailor's services, but that command also invests in the sailor by providing training and experience. It is this investment activity that makes the sailor more valuable to commands later in the supply chain. An optimal system will encourage commands to invest in sailor attributes that are desired by other commands with jobs later in the supply chain. The model that is outlined in this paper measures the value of assigning a sailor to a particular job early enough to encourage this investment while recognising the inputs of all relevant stakeholders.","PeriodicalId":365774,"journal":{"name":"International Journal of Services Sciences","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125959720","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Sarbanes-Oxley act and the production efficiency of public accounting firms in supplying accounting auditing and consulting services: an application of data envelopment analysis","authors":"Mei-Hwa Lin, H. Choy, W. Cooper, Hsihui Chang","doi":"10.1504/IJSSCI.2008.017586","DOIUrl":"https://doi.org/10.1504/IJSSCI.2008.017586","url":null,"abstract":"In this paper, we employ alternate techniques to examine whether passage of the Sarbanes-Oxley (SOX) Act has had positive effects on the efficiency of public accounting firms. These alternate techniques extend from use of the non-parametric, 'frontier'-oriented method of Data Envelopment Analysis (DEA), and include more traditional regression-based approaches using central tendency estimates. Using data from 58 of the 100 largest accounting firms in the USA, we find that efficiency increased at high levels of statistical significance and discover that this result is consistent for all of the different methods - frontier and central tendencies used in this paper. We also find that this result is not affected by inclusion or exclusion of the Big 4 firms. All results are found to be robust as well as consistent.","PeriodicalId":365774,"journal":{"name":"International Journal of Services Sciences","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128917633","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Some now, some later? Selecting a 'lot size' of e-mails to process at one time","authors":"Narges Kasiri, R. Sharda","doi":"10.1504/IJSSCI.2008.017589","DOIUrl":"https://doi.org/10.1504/IJSSCI.2008.017589","url":null,"abstract":"Efficient allocation of e-mail processing time will have a major impact on an organisation's productivity. When a Knowledge Worker (KW) is processing an e-mail, should she process all the e-mail in her inbox, or allocate time for e-mail and other activities? The KW's time may have varying values in different periods depending on other activities required of her in each period. Not answering e-mails quickly or rescheduling daily tasks to answer e-mails may incur a cost. On the other hand, valuable time spent on e-mail also results in a cost. These two types of costs are analogous to backorder/holding and production costs in inventory models. The objective is to find an optimal e-mail time allocation policy that minimises the total cost of processing all e-mails in a timely manner. This study, by adapting a capacitated lot sizing approach, demonstrates an interesting application of inventory models in a service area where time is the commodity being managed.","PeriodicalId":365774,"journal":{"name":"International Journal of Services Sciences","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126860906","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}