{"title":"Examining Trust within the Team in IT Startup Companies--An Empirical Study in the People's Republic of China","authors":"Oliver Oechslein, A. Tumasjan","doi":"10.1109/HICSS.2012.261","DOIUrl":"https://doi.org/10.1109/HICSS.2012.261","url":null,"abstract":"The People's Republic of China has shown strong economic growth rates within the last years, which can in part be attributed to the increasing foundation of startup companies, especially in the IT sector. Due to a lack of familiarity with novel situations, it is difficult for entrepreneurial teams to operate successfully during the first years after starting out. Previous research suggests that high levels of trust within the team can mitigate these difficulties and positively influence the relational capital that in turn is beneficial for the success of startup companies. The present study analyzes influencing variables on the relational capital dimension trust within IT startup companies in China. The results show that the innovativeness of a business idea as well as the business growth potential have a positive impact on trust within the entrepreneurial team, especially if the team consists of Chinese - as opposed to non-Chinese - startup founders.","PeriodicalId":380801,"journal":{"name":"2012 45th Hawaii International Conference on System Sciences","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-02-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131070276","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Exploring the Influence of Vendor Reputation in IT Outsourcing Decisions: A Transaction Cost Perspective","authors":"Kenneth J. Park","doi":"10.1109/HICSS.2012.270","DOIUrl":"https://doi.org/10.1109/HICSS.2012.270","url":null,"abstract":"Past research indicates that firm reputation can be valuable intangible resource by signaling unobservable quality about products, services, skills, and capabilities. Although we might expect firms facing IT outsourcing decisions to consider reputation as a means for assessing quality among potential vendors, the influence of reputation in so-called 'make- or-buy' decisions is not well understood. Toward addressing this gap, we draw from signaling theory to integrate the reputation concept into the transaction cost framework - the predominant perspective explaining firm boundary decisions - to explore the mechanisms through which vendor reputation influences client outsourcing decisions. We propose a moderated-mediation model in which vendor reputation encourages outsourcing by (1) attenuating the influence of transaction hazards on the threat of opportunism, and (2) strengthening the influence of transaction-promoting factors on the perceived benefits of outsourcing. We believe elaborating the mechanisms through which vendor reputation both substitutes for and complements established transaction attributes in outsourcing decisions potentially augments the established TCE framework in ways important for both theory and practice.","PeriodicalId":380801,"journal":{"name":"2012 45th Hawaii International Conference on System Sciences","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-02-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129845422","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Using Virtualization to Ensure Uninterrupted Access to Software Applications for Financial Services Firms","authors":"Minhua Yang, Y. Wu","doi":"10.1109/HICSS.2012.632","DOIUrl":"https://doi.org/10.1109/HICSS.2012.632","url":null,"abstract":"With inexpensive and stable commodity hardware, virtualization has come of age and is seeing wide implementation. While benefits of virtualization abound, the focus of this paper is on a specific area -- maintaining uninterrupted services. We present a set of functionalities of virtualization software (VMware ESX and Microsoft Hyper-V) that can be used to: (a) provide high availability during planned and unplanned downtime and (b) facilitate easier and more cost-effective disaster recovery. We illustrate their relevance to financial services firms, to which high availability and disaster recovery are particularly important given the nature of their business and regulatory pressure.","PeriodicalId":380801,"journal":{"name":"2012 45th Hawaii International Conference on System Sciences","volume":"37 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-02-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114097651","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Collaborative Algorithm for Computer-Supported Idea Selection in the Front End of Innovation","authors":"Jana Görs, G. Horton, N. Kempe","doi":"10.1109/HICSS.2012.48","DOIUrl":"https://doi.org/10.1109/HICSS.2012.48","url":null,"abstract":"At the first gate of an innovation process, a group of experts has to partition a large number of ill-defined ideas into two sets: those that are to remain under consideration and those that are to be eliminated. We propose a collaborative algorithm to perform this task which is based on a method used in computer-based sorting. The design goal of our algorithm was to combine individual and group decision-making to achieve an optimal balance between speed and simplicity on the one hand and quality of result on the other. The algorithm was compared experimentally with individual and group methods using a test set consisting of 125 ideas. The measures of quality of the new method were close to those of the group result, while its execution time and cognitive load were close to those of the individual method. We conclude that our algorithm is well-suited to the given task.","PeriodicalId":380801,"journal":{"name":"2012 45th Hawaii International Conference on System Sciences","volume":"296 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115231879","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Exposing Chat Features through Analysis of Uptake between Contributions","authors":"D. Suthers, C. Desiato","doi":"10.1109/HICSS.2012.274","DOIUrl":"https://doi.org/10.1109/HICSS.2012.274","url":null,"abstract":"Understanding distributed learning and knowledge creation requires multi-level analysis of local activity and of how this local activity gives rise to larger phenomena in a network. Computational support is needed for such analyses due to the size of the data and distributed nature of interaction. This paper reports on one step towards implementing an analytic framework that addresses these needs. Contingencies, defined as observed relationships between contributions that evidence contextual relevance, are computed according to automatable rules, and combined to infer uptake relations between contributions. The resulting uptake structure is then analyzed through various network-analytic methods and is also transformed into a graph of uptake between actors for social network analysis. Our initial results show that a simple contingency analysis based on temporal factors, actor addressing, and lexical overlap provides structures of sufficient quality for identification of major features of a discussion and the roles of actors. The results are expected to improve as semantic analysis is added.","PeriodicalId":380801,"journal":{"name":"2012 45th Hawaii International Conference on System Sciences","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115435482","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On the Fault-Detection Capabilities of Adaptive Random Test Case Prioritization: Case Studies with Large Test Suites","authors":"Z. Zhou, A. Sinaga, W. Susilo","doi":"10.1109/HICSS.2012.454","DOIUrl":"https://doi.org/10.1109/HICSS.2012.454","url":null,"abstract":"An adaptive random (AR) testing strategy has recently been developed and examined by a growing body of research. More recently, this strategy has been applied to prioritizing regression test cases based on code coverage using the concepts of Jaccard Distance (JD) and Coverage Manhattan Distance (CMD). Code coverage, however, does not consider frequency, furthermore, comparison between JD and CMD has not yet been made. This research fills the gap by first investigating the fault-detection capabilities of using frequency information for AR test case prioritization, and then comparing JD and CMD. Experimental results show that \"coverage\" was more useful than \"frequency\" although the latter can sometimes complement the former, and that CMD was superior to JD. It is also found that, for certain faults, the conventional \"additional\" algorithm (widely accepted as one of the best algorithms for test case prioritization) could perform much worse than random testing on large test suites.","PeriodicalId":380801,"journal":{"name":"2012 45th Hawaii International Conference on System Sciences","volume":"153 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115583567","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Vehicle Routing with Driver Learning for Real World CEP Problems","authors":"M. Kunkel, M. Schwind","doi":"10.1109/HICSS.2012.633","DOIUrl":"https://doi.org/10.1109/HICSS.2012.633","url":null,"abstract":"Despite the fact that the vehicle routing problem (VRP) with its variants has been widely explored in operations research, there is very little published research on the VRP concerning real world constraint combinations and large problem sizes. In this work a heuristic solution approach for the VRP with real world constraints is presented driven by the requirements defined by clients in the courier, express and parcel (CEP) delivery industry in order to support their routing plan decisions and driver assignments. The solution algorithm used combines several local-search-based heuristics with constructive elements to solve the VRP with driver learning (VRPDL). As conceptual proof large instances for the capacitated VRP (CVRP) including 560 to 1200 customers are tested and compared to known benchmark results. From those instances new sub-instances are created and sequentially tested adding the driver learning constraint. Finally, the solver is applied to real world CEP instances with driver learning.","PeriodicalId":380801,"journal":{"name":"2012 45th Hawaii International Conference on System Sciences","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124372282","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Paradise by the Dashboard Light: Designing Governance Metrics in Turbulent Environments","authors":"Hans P. Borgman, Hauke Heier, B. Bahli","doi":"10.1109/HICSS.2012.465","DOIUrl":"https://doi.org/10.1109/HICSS.2012.465","url":null,"abstract":"One of the emerging sweet-spots in business intelligence (BI) and business performance management (BPM) projects is the design of metrics (dashboards) in such a way that they balance the need for \"inward focused\" operational management with the need for \"outward-focused\" strategic management. Unfortunately, hitting this sweet spot often proves to be a difficult process, particularly in more turbulent environments. This article aims to understand the forces at work in the design process of these metrics using two starkly contrasting case studies involving the design of dashboards for IT departments, specifically for IT governance which concerns the alignment between business and IT. The first case explores metrics design for an organization with low external and high internal turbulence (a German insurance company), the second contrasting case focuses on a similar metrics design process but now for an organization facing low internal turbulence and high external turbulence (an African national government). Our findings suggest how the source of project turbulence impacts the success of the metrics design process, the bias towards more inward-focused or outward-focused metrics, and the overall outcomes of the project.","PeriodicalId":380801,"journal":{"name":"2012 45th Hawaii International Conference on System Sciences","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124392815","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Do Me a Solid? Information Asymmetry, Liking, and Compliance Gaining Online","authors":"Nathan J. Claes, Carolyn Hurley, M. Stefanone","doi":"10.1109/HICSS.2012.226","DOIUrl":"https://doi.org/10.1109/HICSS.2012.226","url":null,"abstract":"As the popularity of interactive social media grows, it is increasingly normal for individuals to reveal significant amounts of personal information online. Although this information is intended to support social networks, it can potentially be misused. We hypothesize that access to routine network site profile information can enable individuals to foster feelings of interpersonal attraction in their communication partner, which should increase the likelihood that their partner complies with requests for help. This study reports on an experiment conducted to assess these relationships. Results show participants who had access to personal information about their conversation partner in zero history dyads were more likely to gain their partner's compliance. Surprisingly, participants who benefited from the information asymmetry incurred a cost as well, as their partners reported liking them less compared to the control condition. Further, those who rated the information as valuable for getting their partner to like them were the least successful at gaining compliance.","PeriodicalId":380801,"journal":{"name":"2012 45th Hawaii International Conference on System Sciences","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116926820","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Insider Threat Behavior Factors: A Comparison of Theory with Reported Incidents","authors":"A. Munshi, Peter Dell, H. Armstrong","doi":"10.1109/HICSS.2012.326","DOIUrl":"https://doi.org/10.1109/HICSS.2012.326","url":null,"abstract":"Almost all organizations and sectors are currently faced with the problem of insider threats to vital computer assets. Internal incidents can cause more than just financial losses, the costs can also include loss of clients and damage to an organization's reputation. Substantial academic research investigating internal threats has been conducted. This paper examines a number of theoretical models drawn from academic literature to identify a set of factors that are thought to be behavior factors associated with insider threats. These factors are then critiqued using empirical evidence from reported incidents, resulting in insights into areas where the theoretical perspectives of academic literature are both supported and unsupported by actual case evidence. The paper concludes with recommendations for future research directions for academic researchers.","PeriodicalId":380801,"journal":{"name":"2012 45th Hawaii International Conference on System Sciences","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117139844","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}