{"title":"E-Book Platform Competition in the Presence of Two-Sided Network Externalities","authors":"Yabing Jiang","doi":"10.2139/ssrn.2164395","DOIUrl":"https://doi.org/10.2139/ssrn.2164395","url":null,"abstract":"The success of the Kindle e-book platform and the increased popularity of e-books among members of the reading community have attracted extensive interest in the high-tech industry. New platform providers are jumping in the market to compete for device and e-book sales. In this paper, we model the direct competition in the e-book platform market through a two-sided network externality model. We show that publishers can influence consumers' e-book platform adoption decisions and the total e-book sales by strategically deciding the size of contents available on each platform.","PeriodicalId":380801,"journal":{"name":"2012 45th Hawaii International Conference on System Sciences","volume":"224 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130738819","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Using Deterrence to Mitigate Employee Internet Abuse","authors":"M. Shepherd, G. Klein","doi":"10.1109/HICSS.2012.627","DOIUrl":"https://doi.org/10.1109/HICSS.2012.627","url":null,"abstract":"This study looks at the question of how to reduce/eliminate employee Internet Abuse. Companies have used acceptable use policies (AUP) and technology in an attempt to mitigate employees' personal use of company resources. Research shows that AUPs do not do a good job at this but that technology does. Research also shows that while technology can be used to greatly restrict personal use of the internet in the workplace, employee satisfaction with the workplace suffers when this is done. In this research experiment we used technology not to restrict employee use of company resources for personal use, but to make the employees more aware of the current Acceptable Use Policy, and measured the decrease in employee internet abuse. The results show that this method can result in a drop from 27 to 21 percent personal use of the company networks.","PeriodicalId":380801,"journal":{"name":"2012 45th Hawaii International Conference on System Sciences","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-02-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124909234","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Acculturation Disparity Analysis Model (ADAM): Experts and Apprentices","authors":"Darryl D. Diptee","doi":"10.1109/HICSS.2012.90","DOIUrl":"https://doi.org/10.1109/HICSS.2012.90","url":null,"abstract":"As apprentices begin the long journey that will ultimately prepare them to become the respected peers of their expert counterparts, the acculturation process can be detrimental to their success under steep learning curves and strict timelines. Many acculturation models exist, but there appears to be a gap in the underpinning foundational knowledge-base of the acculturation process, specifically between experts and their apprentices. A new and powerful theoretical framework named the Acculturation Disparity Analysis Model (ADAM) was generated from interview data and subsequently combined with two theoretical lenses. This model can serve as a mechanism to forecast acculturative outcomes between experts and apprentices and also as a restructuring tool for organizational policies to make the most of the acculturation experience. Though expanding theory, the ADAM should be recognized as a generalized model to stimulate further qualitative research in the robust and exciting field of acculturation approaches.","PeriodicalId":380801,"journal":{"name":"2012 45th Hawaii International Conference on System Sciences","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-02-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123756038","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Diffusion of an Online Collaboration Tool: The Case of Google Wave Adoption Failure","authors":"L. Kaewkitipong","doi":"10.1109/HICSS.2012.215","DOIUrl":"https://doi.org/10.1109/HICSS.2012.215","url":null,"abstract":"The research set to understand reasons for the failure of Google Wave adoption. Based on the Diffusion of Innovation theory, this research employed the content analysis method to analyze secondary data from online forums that discussed the failure of Google Wave. Additionally, primary data were collected from early adopters who had discontinued using Google Wave. The research adds to the literature on adoption of online collaboration tools. It discusses factors accounting for Google Wave failure. Complexity and a lack of relative advantage are found as most-frequently-cited reasons for the failure. The invite-only policy is also cited as one of the main reasons. For academics, this paper highlights the importance of group decision-making as individual adopters with no one to use a tool with will eventually result in rejection of the tool. For collaboration tool developers, the research highlights the conflict between being an all-in-one tool and keeping the tool simple.","PeriodicalId":380801,"journal":{"name":"2012 45th Hawaii International Conference on System Sciences","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-02-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123623933","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design, Implementation, and Evaluation of a Virtual Meeting Tool-Based Innovation for UML Technology Training in Global Organizations","authors":"Mervi Koivulahti-Ojala, Timo Käkölä","doi":"10.1109/HICSS.2012.198","DOIUrl":"https://doi.org/10.1109/HICSS.2012.198","url":null,"abstract":"End-user training is complicated to implement in global corporations whose activities are typically scattered across multiple sites in different countries and leverage information systems in various ways. This is especially true in global software development where the sites may leverage a development tool for totally different purposes. Web-based Virtual Meeting Tools (VMT) enable synchronous communication globally through interactive audio, online chats, video, and the sharing of presentations. They provide potentially a cost effective way to train even complex topics to large numbers of people in global settings. Few industrial experiences from the design and use of VMT-based training innovations have been reported. This paper draws upon a case study in a global corporation to describe the design, implementation, and evaluation of a training innovation, consisting of a set of courses delivered by means of a VMT and conference calls, to support the global deployment of a Unified Modeling Language (UML) modeling tool and to develop UML modeling skills. Evaluation is based on interviews to verify 1) the impacts of the innovation on skills, knowledge and motivation, 2) perceived learner satisfaction with respect to the innovation. The innovation proved successful in improving skills, knowledge, and motivation in the case organization and learners were satisfied with it. Other organizations may benefit from using VMT to train people to use similar complex information systems for supporting global software development.","PeriodicalId":380801,"journal":{"name":"2012 45th Hawaii International Conference on System Sciences","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-02-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124728925","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sunghan Ryu, Byungho Park, Hyunsuk Im, Jonghyun Hong, Junyeong Lee
{"title":"Do I Want to Pay to Download Movies? Predicting Acceptance of Legal Online Movie Download Services","authors":"Sunghan Ryu, Byungho Park, Hyunsuk Im, Jonghyun Hong, Junyeong Lee","doi":"10.1109/HICSS.2012.225","DOIUrl":"https://doi.org/10.1109/HICSS.2012.225","url":null,"abstract":"This study attempts to broaden our understanding of the nature and characteristics of legal online movie download services by comparing them to other types of online services, and more importantly, explore factors that influence consumers' acceptance of these legal online movie download services. In order to accomplish this, four aspects of the legal online movie download service (common, information system, entertainment and legal) have been identified and verified, using theory of planned behavior (TPB) and technology acceptance model (TAM) as the theoretical framework. Results show that the information aspect (perceived usefulness and perceived ease of use) and entertainment aspect (perceived playfulness) have significant relationship with attitude toward the service, while legal aspect (risk aversion) affects subjective norm related to accepting the service. Results show that attitude and subjective norm have impact on intent to adopt the movie download service while perceived behavioral control, which is seen as an important factor for other online service adoption, did not demonstrate any significant relationship with behavioral intent. Interpretation of regression analysis and implication of the findings is discussed.","PeriodicalId":380801,"journal":{"name":"2012 45th Hawaii International Conference on System Sciences","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-02-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130606714","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Agile Values, Innovation and the Shortage of Women Software Developers","authors":"Ken H. Judy","doi":"10.1109/HICSS.2012.92","DOIUrl":"https://doi.org/10.1109/HICSS.2012.92","url":null,"abstract":"The percentage of women software developers in the U.S. has declined from 42% in 1987 to less than 25% today. This is in a software/internet marketplace where women are online in equal numbers to men, directly or indirectly influence 61% of consumer electronics purchases, generate 58% of online dollars, and represent 42% of active gamers. Women avoid careers in software due to hostile environments, unsustainable pace, diminished sense of purpose, disadvantages in pay, and lack of advancement, peers or mentors. Agile Software Development is founded upon values that challenge such dysfunction in order to build self-organizing, collaborative and highly productive teams. In a high functioning Agile practice, developers engage each other, product owners and sponsors in a shared concern for quality, predictability and meeting the needs of end users. Can Agile values and practice drive changes in the workplace to better attract and retain women software developers?","PeriodicalId":380801,"journal":{"name":"2012 45th Hawaii International Conference on System Sciences","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-02-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125557167","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Repeatable Collaboration Process for Exploring Business Process Improvement Alternatives","authors":"Mercy Amiyo, J. Nabukenya, H. Sol","doi":"10.1109/HICSS.2012.77","DOIUrl":"https://doi.org/10.1109/HICSS.2012.77","url":null,"abstract":"The dynamic nature of organisations has increased demand for business process agility leading to the adoption of continuous Business Process Improvement (BPI). Success of BPI projects calls for continuous process analysis and exploration of several improvement alternatives. These activities are knowledge intensive requiring multi-disciplinary skills. Coupled with the cross-cutting nature of business processes attainment of one's business goal necessitates collaboration among stakeholders in many business process improvement efforts. However the existing tools provide limited to no support for this kind of collaboration, especially in the decision processes involved. In light of this, we designed a repeatable collaboration process (CP) for BPI alternative exploration. The CP consists of two modules aimed at the generation of BPI alternatives and the selection of a BPI alternative respectively. Evaluation results from testing sessions at two organisations show that the CP provides support for the BPI generation and selection process, and is useful for BPI alternative exploration.","PeriodicalId":380801,"journal":{"name":"2012 45th Hawaii International Conference on System Sciences","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-02-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122543107","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yoginder S. Dandass, Samuel T. Shannon, D. Dampier
{"title":"Teaching Hypervisor Design, Implementation, and Control to Undergraduate Computer Science and Computer Engineering Students","authors":"Yoginder S. Dandass, Samuel T. Shannon, D. Dampier","doi":"10.1109/HICSS.2012.554","DOIUrl":"https://doi.org/10.1109/HICSS.2012.554","url":null,"abstract":"The study of design issues and implementation techniques for hypervisors is becoming an increasingly important aspect of operating systems pedagogy. There is a demand for students, especially in the field of information assurance, who understand the security issues exposed by the improper use of virtualization functionality provided by modern processors and how virtualization can be exploited to improve system security. Furthermore, students need to understand the process isolation vs. performance tradeoffs that must be made when designing hypervisors. This paper describes the experience of the authors in teaching a single-semester course to undergraduate students in designing, implementing, and debugging a hyper visor for an Intel 64 processor. Advanced topics in the course include how to capture and manage I/O and interrupt events in the hyper visor. The paper also discusses the use of a PCIe-based hardware module for monitoring and debugging the hyper visor implementation.","PeriodicalId":380801,"journal":{"name":"2012 45th Hawaii International Conference on System Sciences","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-02-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115262980","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Platform Pricing with Strategic Buyers","authors":"Yifan Dou, D. J. Wu, Jing Chen","doi":"10.1109/HICSS.2012.473","DOIUrl":"https://doi.org/10.1109/HICSS.2012.473","url":null,"abstract":"Digital platforms are ubiquitous. While there has been a growing academic literature on platform strategies, little is known about platform pricing when buyers are strategic. In contrast to myopic buyers--who make decisions solely based on their current period utility, strategic buyers take into account future period utility in their decision making. They may wait-and-see, enter-early, or free-ride, in responding to key platform-specific factors such as cross-side network effects, and switching cost. Using a two-period analytical model, we derive optimal buyer-side pricing strategies for a monopolistic platform owner under three prevalent pricing models: subscription-based, license-based, and time-limited freemium (TLF). Compared with myopic buyers, strategic buyers do not affect optimal pricing strategies under the subscription model or under TLF with no switching cost, but significantly change optimal pricing strategies and adoption dynamics under the license model and under TLF with positive switching costs. The three models are also compared numerically.","PeriodicalId":380801,"journal":{"name":"2012 45th Hawaii International Conference on System Sciences","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-02-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116060195","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}