2012 45th Hawaii International Conference on System Sciences最新文献

筛选
英文 中文
Examining Trust within the Team in IT Startup Companies--An Empirical Study in the People's Republic of China IT创业公司团队信任检验——基于中华人民共和国的实证研究
2012 45th Hawaii International Conference on System Sciences Pub Date : 2012-02-09 DOI: 10.1109/HICSS.2012.261
Oliver Oechslein, A. Tumasjan
{"title":"Examining Trust within the Team in IT Startup Companies--An Empirical Study in the People's Republic of China","authors":"Oliver Oechslein, A. Tumasjan","doi":"10.1109/HICSS.2012.261","DOIUrl":"https://doi.org/10.1109/HICSS.2012.261","url":null,"abstract":"The People's Republic of China has shown strong economic growth rates within the last years, which can in part be attributed to the increasing foundation of startup companies, especially in the IT sector. Due to a lack of familiarity with novel situations, it is difficult for entrepreneurial teams to operate successfully during the first years after starting out. Previous research suggests that high levels of trust within the team can mitigate these difficulties and positively influence the relational capital that in turn is beneficial for the success of startup companies. The present study analyzes influencing variables on the relational capital dimension trust within IT startup companies in China. The results show that the innovativeness of a business idea as well as the business growth potential have a positive impact on trust within the entrepreneurial team, especially if the team consists of Chinese - as opposed to non-Chinese - startup founders.","PeriodicalId":380801,"journal":{"name":"2012 45th Hawaii International Conference on System Sciences","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-02-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131070276","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Exploring the Influence of Vendor Reputation in IT Outsourcing Decisions: A Transaction Cost Perspective 供应商声誉对IT外包决策的影响:交易成本视角
2012 45th Hawaii International Conference on System Sciences Pub Date : 2012-02-09 DOI: 10.1109/HICSS.2012.270
Kenneth J. Park
{"title":"Exploring the Influence of Vendor Reputation in IT Outsourcing Decisions: A Transaction Cost Perspective","authors":"Kenneth J. Park","doi":"10.1109/HICSS.2012.270","DOIUrl":"https://doi.org/10.1109/HICSS.2012.270","url":null,"abstract":"Past research indicates that firm reputation can be valuable intangible resource by signaling unobservable quality about products, services, skills, and capabilities. Although we might expect firms facing IT outsourcing decisions to consider reputation as a means for assessing quality among potential vendors, the influence of reputation in so-called 'make- or-buy' decisions is not well understood. Toward addressing this gap, we draw from signaling theory to integrate the reputation concept into the transaction cost framework - the predominant perspective explaining firm boundary decisions - to explore the mechanisms through which vendor reputation influences client outsourcing decisions. We propose a moderated-mediation model in which vendor reputation encourages outsourcing by (1) attenuating the influence of transaction hazards on the threat of opportunism, and (2) strengthening the influence of transaction-promoting factors on the perceived benefits of outsourcing. We believe elaborating the mechanisms through which vendor reputation both substitutes for and complements established transaction attributes in outsourcing decisions potentially augments the established TCE framework in ways important for both theory and practice.","PeriodicalId":380801,"journal":{"name":"2012 45th Hawaii International Conference on System Sciences","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-02-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129845422","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Using Virtualization to Ensure Uninterrupted Access to Software Applications for Financial Services Firms 使用虚拟化确保金融服务公司对软件应用程序的不间断访问
2012 45th Hawaii International Conference on System Sciences Pub Date : 2012-02-09 DOI: 10.1109/HICSS.2012.632
Minhua Yang, Y. Wu
{"title":"Using Virtualization to Ensure Uninterrupted Access to Software Applications for Financial Services Firms","authors":"Minhua Yang, Y. Wu","doi":"10.1109/HICSS.2012.632","DOIUrl":"https://doi.org/10.1109/HICSS.2012.632","url":null,"abstract":"With inexpensive and stable commodity hardware, virtualization has come of age and is seeing wide implementation. While benefits of virtualization abound, the focus of this paper is on a specific area -- maintaining uninterrupted services. We present a set of functionalities of virtualization software (VMware ESX and Microsoft Hyper-V) that can be used to: (a) provide high availability during planned and unplanned downtime and (b) facilitate easier and more cost-effective disaster recovery. We illustrate their relevance to financial services firms, to which high availability and disaster recovery are particularly important given the nature of their business and regulatory pressure.","PeriodicalId":380801,"journal":{"name":"2012 45th Hawaii International Conference on System Sciences","volume":"37 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-02-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114097651","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Collaborative Algorithm for Computer-Supported Idea Selection in the Front End of Innovation 创新前端计算机支持的协同思想选择算法
2012 45th Hawaii International Conference on System Sciences Pub Date : 2012-01-04 DOI: 10.1109/HICSS.2012.48
Jana Görs, G. Horton, N. Kempe
{"title":"A Collaborative Algorithm for Computer-Supported Idea Selection in the Front End of Innovation","authors":"Jana Görs, G. Horton, N. Kempe","doi":"10.1109/HICSS.2012.48","DOIUrl":"https://doi.org/10.1109/HICSS.2012.48","url":null,"abstract":"At the first gate of an innovation process, a group of experts has to partition a large number of ill-defined ideas into two sets: those that are to remain under consideration and those that are to be eliminated. We propose a collaborative algorithm to perform this task which is based on a method used in computer-based sorting. The design goal of our algorithm was to combine individual and group decision-making to achieve an optimal balance between speed and simplicity on the one hand and quality of result on the other. The algorithm was compared experimentally with individual and group methods using a test set consisting of 125 ideas. The measures of quality of the new method were close to those of the group result, while its execution time and cognitive load were close to those of the individual method. We conclude that our algorithm is well-suited to the given task.","PeriodicalId":380801,"journal":{"name":"2012 45th Hawaii International Conference on System Sciences","volume":"296 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115231879","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Exposing Chat Features through Analysis of Uptake between Contributions 通过分析贡献之间的吸收来揭示聊天功能
2012 45th Hawaii International Conference on System Sciences Pub Date : 2012-01-04 DOI: 10.1109/HICSS.2012.274
D. Suthers, C. Desiato
{"title":"Exposing Chat Features through Analysis of Uptake between Contributions","authors":"D. Suthers, C. Desiato","doi":"10.1109/HICSS.2012.274","DOIUrl":"https://doi.org/10.1109/HICSS.2012.274","url":null,"abstract":"Understanding distributed learning and knowledge creation requires multi-level analysis of local activity and of how this local activity gives rise to larger phenomena in a network. Computational support is needed for such analyses due to the size of the data and distributed nature of interaction. This paper reports on one step towards implementing an analytic framework that addresses these needs. Contingencies, defined as observed relationships between contributions that evidence contextual relevance, are computed according to automatable rules, and combined to infer uptake relations between contributions. The resulting uptake structure is then analyzed through various network-analytic methods and is also transformed into a graph of uptake between actors for social network analysis. Our initial results show that a simple contingency analysis based on temporal factors, actor addressing, and lexical overlap provides structures of sufficient quality for identification of major features of a discussion and the roles of actors. The results are expected to improve as semantic analysis is added.","PeriodicalId":380801,"journal":{"name":"2012 45th Hawaii International Conference on System Sciences","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115435482","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 31
On the Fault-Detection Capabilities of Adaptive Random Test Case Prioritization: Case Studies with Large Test Suites 自适应随机测试用例优先级的故障检测能力:大型测试套件的案例研究
2012 45th Hawaii International Conference on System Sciences Pub Date : 2012-01-04 DOI: 10.1109/HICSS.2012.454
Z. Zhou, A. Sinaga, W. Susilo
{"title":"On the Fault-Detection Capabilities of Adaptive Random Test Case Prioritization: Case Studies with Large Test Suites","authors":"Z. Zhou, A. Sinaga, W. Susilo","doi":"10.1109/HICSS.2012.454","DOIUrl":"https://doi.org/10.1109/HICSS.2012.454","url":null,"abstract":"An adaptive random (AR) testing strategy has recently been developed and examined by a growing body of research. More recently, this strategy has been applied to prioritizing regression test cases based on code coverage using the concepts of Jaccard Distance (JD) and Coverage Manhattan Distance (CMD). Code coverage, however, does not consider frequency, furthermore, comparison between JD and CMD has not yet been made. This research fills the gap by first investigating the fault-detection capabilities of using frequency information for AR test case prioritization, and then comparing JD and CMD. Experimental results show that \"coverage\" was more useful than \"frequency\" although the latter can sometimes complement the former, and that CMD was superior to JD. It is also found that, for certain faults, the conventional \"additional\" algorithm (widely accepted as one of the best algorithms for test case prioritization) could perform much worse than random testing on large test suites.","PeriodicalId":380801,"journal":{"name":"2012 45th Hawaii International Conference on System Sciences","volume":"153 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115583567","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 34
Vehicle Routing with Driver Learning for Real World CEP Problems 现实世界CEP问题的车辆路径与驾驶员学习
2012 45th Hawaii International Conference on System Sciences Pub Date : 2012-01-04 DOI: 10.1109/HICSS.2012.633
M. Kunkel, M. Schwind
{"title":"Vehicle Routing with Driver Learning for Real World CEP Problems","authors":"M. Kunkel, M. Schwind","doi":"10.1109/HICSS.2012.633","DOIUrl":"https://doi.org/10.1109/HICSS.2012.633","url":null,"abstract":"Despite the fact that the vehicle routing problem (VRP) with its variants has been widely explored in operations research, there is very little published research on the VRP concerning real world constraint combinations and large problem sizes. In this work a heuristic solution approach for the VRP with real world constraints is presented driven by the requirements defined by clients in the courier, express and parcel (CEP) delivery industry in order to support their routing plan decisions and driver assignments. The solution algorithm used combines several local-search-based heuristics with constructive elements to solve the VRP with driver learning (VRPDL). As conceptual proof large instances for the capacitated VRP (CVRP) including 560 to 1200 customers are tested and compared to known benchmark results. From those instances new sub-instances are created and sequentially tested adding the driver learning constraint. Finally, the solver is applied to real world CEP instances with driver learning.","PeriodicalId":380801,"journal":{"name":"2012 45th Hawaii International Conference on System Sciences","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124372282","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Paradise by the Dashboard Light: Designing Governance Metrics in Turbulent Environments 仪表盘灯下的天堂:在动荡的环境中设计治理指标
2012 45th Hawaii International Conference on System Sciences Pub Date : 2012-01-04 DOI: 10.1109/HICSS.2012.465
Hans P. Borgman, Hauke Heier, B. Bahli
{"title":"Paradise by the Dashboard Light: Designing Governance Metrics in Turbulent Environments","authors":"Hans P. Borgman, Hauke Heier, B. Bahli","doi":"10.1109/HICSS.2012.465","DOIUrl":"https://doi.org/10.1109/HICSS.2012.465","url":null,"abstract":"One of the emerging sweet-spots in business intelligence (BI) and business performance management (BPM) projects is the design of metrics (dashboards) in such a way that they balance the need for \"inward focused\" operational management with the need for \"outward-focused\" strategic management. Unfortunately, hitting this sweet spot often proves to be a difficult process, particularly in more turbulent environments. This article aims to understand the forces at work in the design process of these metrics using two starkly contrasting case studies involving the design of dashboards for IT departments, specifically for IT governance which concerns the alignment between business and IT. The first case explores metrics design for an organization with low external and high internal turbulence (a German insurance company), the second contrasting case focuses on a similar metrics design process but now for an organization facing low internal turbulence and high external turbulence (an African national government). Our findings suggest how the source of project turbulence impacts the success of the metrics design process, the bias towards more inward-focused or outward-focused metrics, and the overall outcomes of the project.","PeriodicalId":380801,"journal":{"name":"2012 45th Hawaii International Conference on System Sciences","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124392815","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Do Me a Solid? Information Asymmetry, Liking, and Compliance Gaining Online 帮我个忙?信息不对称、喜欢和顺从在网上获得
2012 45th Hawaii International Conference on System Sciences Pub Date : 2012-01-04 DOI: 10.1109/HICSS.2012.226
Nathan J. Claes, Carolyn Hurley, M. Stefanone
{"title":"Do Me a Solid? Information Asymmetry, Liking, and Compliance Gaining Online","authors":"Nathan J. Claes, Carolyn Hurley, M. Stefanone","doi":"10.1109/HICSS.2012.226","DOIUrl":"https://doi.org/10.1109/HICSS.2012.226","url":null,"abstract":"As the popularity of interactive social media grows, it is increasingly normal for individuals to reveal significant amounts of personal information online. Although this information is intended to support social networks, it can potentially be misused. We hypothesize that access to routine network site profile information can enable individuals to foster feelings of interpersonal attraction in their communication partner, which should increase the likelihood that their partner complies with requests for help. This study reports on an experiment conducted to assess these relationships. Results show participants who had access to personal information about their conversation partner in zero history dyads were more likely to gain their partner's compliance. Surprisingly, participants who benefited from the information asymmetry incurred a cost as well, as their partners reported liking them less compared to the control condition. Further, those who rated the information as valuable for getting their partner to like them were the least successful at gaining compliance.","PeriodicalId":380801,"journal":{"name":"2012 45th Hawaii International Conference on System Sciences","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116926820","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Insider Threat Behavior Factors: A Comparison of Theory with Reported Incidents 内部威胁行为因素:理论与报告事件的比较
2012 45th Hawaii International Conference on System Sciences Pub Date : 2012-01-04 DOI: 10.1109/HICSS.2012.326
A. Munshi, Peter Dell, H. Armstrong
{"title":"Insider Threat Behavior Factors: A Comparison of Theory with Reported Incidents","authors":"A. Munshi, Peter Dell, H. Armstrong","doi":"10.1109/HICSS.2012.326","DOIUrl":"https://doi.org/10.1109/HICSS.2012.326","url":null,"abstract":"Almost all organizations and sectors are currently faced with the problem of insider threats to vital computer assets. Internal incidents can cause more than just financial losses, the costs can also include loss of clients and damage to an organization's reputation. Substantial academic research investigating internal threats has been conducted. This paper examines a number of theoretical models drawn from academic literature to identify a set of factors that are thought to be behavior factors associated with insider threats. These factors are then critiqued using empirical evidence from reported incidents, resulting in insights into areas where the theoretical perspectives of academic literature are both supported and unsupported by actual case evidence. The paper concludes with recommendations for future research directions for academic researchers.","PeriodicalId":380801,"journal":{"name":"2012 45th Hawaii International Conference on System Sciences","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117139844","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信