Exploring the grand challenges for next generation eBusiness

Transcription

Exploring the grand challenges for next generation eBusiness
g
Association for Information Systems Special Interest Group on eBusiness (SIGeBiz) Exploring the grand challenges for next generation eBusiness While Information Systems continue to transform organizations, organizational IT infrastructures and business models are themselves beginning to change. There is an increased focus on service orientation and performance levels of IT infrastructures and systems. Outsourcing and offshoring strategies are evolving to include utility based approaches to computing. These developments are showing promises of a renewed period of innovative thinking in e‐business technologies. This workshop will engage IT researchers to explore and respond to the grand challenges of next generation e‐Business systems.
COMMITTEES Organizing Committee
Honorary Chair Andrew B Whinston, The University of Texas, Austin Conference Co‐Chairs Ting‐Peng Liang, National Sun Yat‐sen University Michael J Shaw, University of Illinois at Urbana‐Champaign Program Co‐Chairs T. S. Raghu, Arizona State University H. R. Rao, State University of New York at Buffalo Raj Sharman, State University of New York at Buffalo Review Chair Sanjukta Das Smith, State University of New York at Buffalo Finance Chair Diwakaran Liginlal, Carnegie Mellon University Local Arrangements Co‐Chairs Beom‐jin Choi, California State University Ron Freeze, Emporia State University Publications Chair Vijay Sugumaran, Oakland University Publicity Chair Anjana Susarla, University of Washington Research‐in‐Progress / Demo Chair Chandra Subramaniam, University of North Carolina, Charlotte Sponsorship Chair Selwyn Piramuthu, University of Florida 1 International Liaisons
Shankar Aggarwal, Dept. of IT, Govt. of India Gregory Kersten, Concordia University, Canada Mahil Carr, Institute for Development and Stefan Klein, Universität Münster, Germany Research in Banking Technology, India Wolf Ketter, Erasmus University, Netherlands Ambuj Mahanti, Indian Institute of Management‐ Calcutta, India Stefan Luckner, Universität Karlsruhe, Germany Jörg P Müller, Clausthal University of Technology, Germany Arunabha Mukhopadhyay, Indian Institute of Management‐ Calcutta, India Omer F Rana, Cardiff University, United Kingdom Dirk Neumann, University of Freiburg, Germany Debashis Saha, Indian Institute of Management‐ Tuure Tuunanen, The University of Auckland, New Zealand Sridhar Varadharajan, Sasken Communication Calcutta, India Technologies, India Shalini Urs, International School of Information Samuel Fosso Wamba, University of Management, India Wollongong, Australia Program Committee
Christof Weinhardt, Universität Karlsruhe, Gove Allen, Brigham Young University
Germany
Subash A Babu, Indian Institute of Technology, Richard Baskerville, Georgia State University Bombay
Ernst Bekkering, Northeastern Oklahoma State Rui Chen, Ball State University
University
Wm. Arthur Conklin, University of Houston
Gurpreet Dhillon, Virginia Common Wealth
Xiao Fang, Toledo University
Fang Fang, California State Uiniversity at San Marcos
Zhiling Guo, University of Maryland, Baltimore Manish Gupta, M&T Bank
Alan R. Hevner, University of South Florida
Paul Hu, University of Utah
Derrick Huang, Florida Atlantic University
Kai Lung HUI, Hong Kong University of Science & Technology
Mark Keith, Arizona State University Jin Ki Kim, Korea Aerospace University Karl Reiner Lang, The City University of New Jin Q. Lee, Oklahoma State University York 2 Nirup Menon, George Mason University Gautam Pant , University of Utah Manoj Parmeswaran, Santa Clara University Selwyn Piramuthu, University of Florida Paul Pavlou, Temple University Sandeep Purao, Pennsylvania State University Daniel O. Rice, Technology Solutions Experts, Sagnika Sen, Pennsylvania State University Inc Thomas Setzer, Technische Universität München Sushil Sharma, Ball State University Olivia Sheng, University of Utah J. P. Shim, Mississippi State University Maghal Simha, Grand Valley State University Rahul Singh, University of North Carolina at Greensboro Shobha Chengalur Smith, State University of Jochen Stoesser, Universität Karlsruhe (TH) New York at Albany Matt Thatcher, University of Louisville Avinash Waiker, Southeastern Louisiana University Jingguo Wang, University of Texas at Arlington Han Zhang, Georgia Tech John Zhang, University of Connecticut Student Acknowledgements
Arizona State University: Aaron Baird, Karthik Janardhan State University of New York at Buffalo: Haricharan Rengamani, Mahesh T Venkatramani, Karthic Raghupathi, and Insu Park University of Illinois, Urbana: John Burke and Yuju Tu 3 KEYN
NOTE SPEAK
KERS Presto
on McAfeee VP & Research ffellow, Yah
hoo! Inc J. Stan
nley Johnso
on Professo
or of Busin
ness, Econo
omics and Managem
ment, Califo
ornia Institu
ute of Tech
hnology Topicc – Cloud C
Control Locatiion: 8:45 am
m to 9:45 aam ‐ Grand
d Canyon 6 Dr. Prreston McA
Afee is Vicce Presiden
nt and Reseearch Fello
ow at Yaho
oo! Researcch in Burbaank, CA, w
where he leeads a grou
up focused
d on microeeconomics research.
y Johnson P
Professor o
of Businesss, Economiics From 2004‐2007,, Dr. McAffee was thee J. Stanley
Managemen
nt at the California In
nstitute of Technolog
gy. and M
McAfee wro
ote Introdu
uction to Ecconomic A
Analysis, a ffree, open‐‐source tex
xt that span
ns Dr. M
both p
principles aand interm
mediate microeconom
mics. He is the authorr of over seeventy articles publisshed in sch
holarly eco
onomics jou
urnals, many of them
m on auctio
ons and bid
dding, and
d co‐
autho
or of a book
k Incentivess in Govern
nment Procu
urement. McAfee serv
ved as one of four eco
onomists w
who edit th
he American
n Economicc Review, th
he Dr. M
most p
prominentt economiccs journal, ffor over niine years, aand serves as an asso
ociate edito
or of the Th
heoretical Ecconomics, aa new open
n access jou
urnal. He is a Fellow o
of the Econometric So
ociety. McA
Afee taugh
ht business strategy a
at the Univ
versity hool of Bussiness in 20000‐2001, and is the aauthor of C
Competitivee of Chiicagoʹs Graaduate Sch
Solutiions: The S
Strategistʹs Toolkit, pu
ublished b
by Princeto
on Universiity Press in
n 2003. 4 4
David Cohn
Director, Business Informatics T.J. Watson Research Centre, IBM Topic ‐ ʺVerbing the Nouns ‐‐ A New Approach to Business Processesʺ Location: 12:15 pm to 1:30 pm ‐ Grand Canyon 6 Dr. David Cohn is Director, Business Informatics at IBM’s T. J. Watson Research Center. He supervises a research team focused on modeling, transforming and integrating information and business structures for on‐demand solutions. He directs IBM’s worldwide research strategy in support of Business Design & Implementation. Prior to his current position, Dr. Cohn was Director of IBM’s Austin Research Laboratory which focuses on exploratory VLSI design, electronic CAD tools and high‐productivity system design and is home of IBMʹs Low‐Power Initiative. He also served as Director, Strategic Projects at Armonk assisting the Chairman and corporate executives in formulating and assessing IBM’s worldwide business strategy. Before joining IBM, he was Professor of Computer Science & Engineering and Professor of Electrical Engineering at Notre Dame. 5 Susan J. Winter Program Director , Cyberinfrastructure National Science Foundation Topic – Grand Challenges in Cyberinfrastructure” Location: 3: 30 pm to 4:30 pm ‐ Grand Canyon 6 Dr. Susan J. Winter is a Program Director in Cyberinfrastructure at the National Science Foundation. She received her PhD from the University of Arizona, her MA from the Claremont Graduate University, and her BA from the University of California, Berkeley and has over 20 years of international managerial and consulting experience. Her research on the impact of ICT on the organization of work has resulted in over 20 publications, 7 grants, and 30 refereed conference presentations (including 3 Best Paper awards). Her work has appeared in Information Systems Research, Information & Management, Frontiers of Entrepreneurship Research and the Database for Advances in Information Systems, been presented at the International Conference on Information Systems and at the Academy of Management, and been included as chapters in scholarly books. She currently serves on the editorial boards of the Journal of Information Technology, Information and Organization, and Group and Organization Management. 6 Schedule – Eighth Workshop on eBusiness – 2009 7:30 am to 8:30 am ‐ Grand Canyon 6 ‐ Registration and Breakfast 8:30 am to 8:45 am – Grand Canyon 6 Welcome by Conference Co‐Chair, Mike Shaw (University of Illinois at Urbana‐Champaign) 8:45 am to 9:45 am ‐ Grand Canyon 6 Keynote Speech: “Cloud Control" by Preston McAfee VP & Research fellow, Yahoo! Inc, J. Stanley Johnson Professor of Business, Economics and Management, California Institute of Technology Introduction by H.R. Rao (SUNY, Buffalo, NY) 9:45 am to 10:45 am – AM1 Parallel Sessions Grand Canyon 2: Human Issues in eBusiness Session Chairs: Hsin‐Lu Chang (National Chengchi University) and Ming Fan (University of Washington) The Impact of Gender Difference on Response Strategy in e‐Negotiation Authors: Wan Jung Lin (National Sun Yat‐sen University ) , Chia‐Hua Hu (National Sun Yat‐sen University) and Hsiangchu Lai (National Sun Yat‐sen University) Examining VoIP Diffusion Factors: A Cross‐National Empirical Analysis Authors: Hyunmi Baek (Seoul National University) and Joongho Ahn (Seoul National University) An Idealet‐Centric Scheme for Large Scale Open Innovation Systems Authors: Matti Hamalainen (Helsinki University of Technology) , Qing Li (Southwestern University of Finance & Economics), Zhangxi Lin (Texas Tech University) and Alin Tomoiaga (Texas Tech University) Grand Canyon 3 : eBusiness Technologies and Standards Session Chairs: Gautam Pant (University of Utah) and Hsiangchu Lai (National Sun Yat‐
sen University) The Value Of IT‐Enabled Business Process Standardization in the Presence Of Market Volatility Authors: Qizhi Dai (Drexel University) , Robert Kauffman (Arizona State University) and Bin Wang (University of Texas‐Pan American) Analyzing Processes behind Web Service Standards Development Authors: Karthikeyan Umapathy (University of North Florida ‐ School of Computing ), Sandeep Purao (Penn State University) and John Bagby (Penn State University) 7 The Role of Mobile Network Operators in the Mobile Application Market Authors: Adrian Holzer(University of Lausanne) and Jan Ondrus (ESSEC Business School) Grand Canyon 4: Customer Centric and Service Oriented Enterprises Session Chairs: Ravi Sen (Texas A&M University) and Qizhi Dai (Drexel University) Factors that Affect the Adoption of Service‐Oriented Architecture in Enterprises: A Content Analysis Authors: Hsin‐Lu Chang (National Cheng Chi University) and Ying‐Ju Lee(National Cheng Chi University) A Framework for CRM E‐Services: From Customer Value Perspective Authors: Wei‐Lun Chang(Tamkang University) and Yu‐Xin Wu (Tamkang University) A Personalized Preference Boundary‐Based Procedure for Recommending New Items Authors: Jae Kyeong Kim(KyungHee University), Moon Kyoung Jang (KyungHee University), Hyea Kyeong Kim (KyungHee University) and Young Ryu (University of Texas at Dallas) Grand Canyon 5: Economics of E‐commerce Session Chairs: Antonis Stylianou (University of North Carolina) and Jialun Qin (University of Massachusetts Lowell) Pricing and Capacity Planning in Online Games: The Design of Contracting‐out Model Authors: Yung‐Ming Li (National Chiao Tung University) and Jhih‐Hua Jhang‐Li (National Chiao Tung University) and Shu‐Wu Chuang (National Chiao Tung University) Comparing the Contracts for Digital Music Service Channels Authors: Yung‐Ming Li(National Chiao Tung University ) and Jhih‐Hua Jhang‐Li (National Chiao Tung University) and Yuan Fang (National Chiao Tung University) Experimental Evaluation Of Declining Buyout Price Models For Online Auctions Authors: Roumen Vragov (City University of New York), Di Shang (Baruch College, City University of New York) and Karl Lang (Baruch College, City University of New York) Grand Canyon 6: Set‐up/ Poster Displayed 10:45 am to 11:15: Grand Canyon 6: Tea / Coffee Break and Poster Session 11: 15 am to 12:15 pm – AM2 Parallel Sessions Grand Canyon 2: Human and Workflow Issues in eBusiness Session Chairs: Zhiling Guo (University of Maryland, Baltimore County) and Fang Yin (University of Oregon) The effects of sense of presence, sense of belonging, and cognitive absorption on satisfaction and user loyalty toward an immersive 3d virtual world: From a first‐time second life user’s 8 perspective Authors: Dan Kim (University of Houston ‐ Clear Lake) and Dongsong Zhang (University of Maryland, Baltimore County) "To Stand Out or to Remain Inconspicuous”: Existence of Cross‐Cultural Communication Differences in Microblogging Author: Chong Oh ( University of Utah) Should Workflow Design Adopt a Layered Process? Author: Shaokun Fan (The University of Arizona) and J. Leon Zhao (The University of Arizona) Grand Canyon 3: Multi‐agent applications and context‐aware architectures in eBusiness Session Chairs: Wolfgang Ketter (RSM Erasmus University) and Jingguo Wang The University of Texas at Arlington) Managing Supply Uncertainty with an Information Market Authors: Zhiling Guo (University of Maryland), Fang Fang (California State University) and Andrew Whinston (University of Texas at Austin) Analyzing Market Interactions in a Multiagent Supply Chain Environment Authors: William Groves (University of Minnesota), John Collins (University of Minnesota) , Wolfgang Ketter (Rotterdam School of Management ‐ Erasmus University) and Maria Gini (University of Minnesota) An Architecture to Support Web‐based Information Extraction Using Domain Ontologies Authors: Vijayan Sugumaran (Oakland University ) and Farid Meziane (Salford University) Grand Canyon 4: Security Informatics Session Chairs: David Koonce (Ohio University) and Divakaran Liginlal (Carnegie Mellon University) Privacy and E‐Authentication: The Dangers of Self‐Disclosure in Social Networks Authors: Divakaran Liginlal (Carnegie Mellon University) and Lara Khansa (Virginia Tech) On The Two Factors Affecting Hospital Information Systems Success In Disaster Context Authors: Insu Park (SUNY, Buffalo), Raj Sharman (SUNY, Buffalo), H. Raghav Rao (SUNY, Buffalo) and Shambhu Upadhyaya (SUNY, Buffalo) Understanding Attitude and Information Disclosure in Online Social Networking Authors: Richard Derham(University of Canterbury) and Annette Mills (University of Canterbury) Grand Canyon 5: Economics of E‐commerce Session Chairs: Virpi Tuunainen (Helsinki School of Economics) and Jin Ki Kim (Korea Aerospace University) 9 Distinct Impact of Information Access Patterns on Non‐contractible Investments and Adaptation for Supply Chain Agility Authors: Chi‐Feng Tai (National Chiayi University), T.G. Wang (Department of Information Management, National Central University), Her‐Sen Doong (National Chiayi University) and Kai Wang (National Kaoshung University) A Foraging Model For Human Behavior In E‐Commerce Authors: Bjarne Berg (Lenoir Rhyne University ‐ University of North Carolina Charlotte) A Framework For Producer‐Intermediary Relationships For The Long Tail Authors: Rob Kauffman (Arizona State University) , T. S. Raghu (Arizona State University) and Matt Sopha (Arizona State University) Grand Canyon 6: Poster Displayed 10 12:15 pm to 1:30 pm ‐ Grand Canyon 6 Lunch + Lunch keynote Address Keynote Speech: “"Verbing the Nouns ‐‐ A New Approach to Business Processes" by David Cohn, Director, Business Informatics, T.J. Watson Research Centre, IBM Introduction by Raj Sharman (SUNY, Buffalo, NY) 1:30 pm to 3:00 pm – PM1 Parallel Sessions Grand Canyon 2: Organizational Implications of Electronic Markets Session Chairs: Junghoon Moon (Korea Advanced Institute of Science and Technology) and Zhangxi Lin (Texas Tech University) Performance measurement and strategic analysis for MDBT Authors: Matteo Della Bordella (Università Carlo Cattane), Aurelio Ravarini (Università Carlo Cattane) and Rong Liu (IBM Research) Assessing the effect of external pressure in interorganizational IS adoption – case electronic invoicing Authors: Esko Penttinen (Helsinki School of Economics ) and Virpi Tuunainen (Helsinki School of Economics) My How You've Grown! e‐Procurement in the Post‐dot‐bomb Era Authors: Tim McLaren (Ryerson University), Catherine Middleton(Ryerson University) and Xueying Fan (Ryerson University) The Effect of Positive Quadrant Dependence Between Projects on Portfolio Value Authors: John C. Burke (University of Illinois at Urbana‐Champaign) and Michael J. Shaw (University of Illinois at Urbana‐Champaign) Grand Canyon 3: RFID Technologies, Models, Issues and Supply Chain Management Session Chairs: Hong Guo (University of Notre Dame) and Wei Zhou (escp europe) When is RFID Perceived as a Radical Technology?: Implications for Adoption and Subsequent Use Authors: Aditya Sharma (North Carolina Central University), Dominic Thomas (North Carolina Central University) and Benn Konsynski (Emory University) Remanufacturing with RFID Item‐Level Information Authors: Wei Zhou(ESCP Europe) and Selwyn Piramuthu (University of Florida) Understanding RFID Infusion in Supply Chain Authors: Xiaoran Wu (University of North Carolina at Charlotte) and Chandrasekar Subramaniam (University of North Carolina at Charlotte) Electronic Commerce On‐Site Search Services; A State Of The Art Review Authors: Nan Li (Dalhousie University), Peter Hitchcock (Dalhousie University), James Blustein (Dalhousie University) and Michael Bliemel (Dalhousie University) 11 Grand Canyon 4: Security Informatics Session Chairs: Mei Lin (The University of Hong Kong) and Muhammad Zaffar (University of North Carolina at Charlotte) Software Vendors’ Patch Release Behaviors: Impact of Vulnerability Characteristics Authors: Orcun Temizkan (University of North Carolina at Charlotte), Ram. L. Kumar (University of North Carolina at Charlotte), Sungjune Park (University of North Carolina at Charlotte) and Chandrasekar Subramaniam (University of North Carolina at Charlotte) Information Security Risks and IT Executives Structural Status in a Top Management Team: An Empirical Examination Authors: Juhee Kwon (Purdue University), Jacquelyn Rees (Purdue University) and Ta‐Wei (David) Wang (National Taiwan University ) Impacts of Network Attacks and Vulnerability Disclosures on Information Security search behavior Authors: Jingguo Wang (University of Texas at Arlington), Nan Xiao (University at Buffalo) and H. Raghav Rao (University at Buffalo) Grand Canyon 5: Economics of E‐commerce Session Chair: Victoria Yoon (University of Maryland) Managing IT Portfolios With Options, Synergies, And Balances: An Integrated Approach Authors: Yu‐Ju Tu (University of Illinois at Urbana‐Champaign) and Michael J. Shaw (University of Illinois at Urbana‐Champaign) Open Innovation in Platform Competition Authors: Mei Lin(The University of Hong Kong ), Xuqing Ke (The University of Texas at Austin) and Andrew Whinston (The University of Texas at Austin) User Discrimination and Net Neutrality Authors: Hong Guo (University of Notre Dame), Subhajyoti Bandyopadhyay (University of Florida) and Hsing Cheng (University of Florida) Competition Between Open Source And Proprietary Software: A Network Externality Analysis Authors: Yipeng Liu (University of Scranton) and Hsing Cheng (University of Florida) Grand Canyon 6: Poster Displayed 3:00 pm to 3:30 pm ‐ Grand Canyon 6: Coffee Break + Poster Session 3: 30 pm to 4:30 pm – Grand Canyon 6 Keynote Speech: “Grand Challenges in Cyber infrastructure " by Susan J. Winter, Program Director , Cyber infrastructure National Science Foundation 12 Introduction by T. S. Raghu (Arizona State University) 13 4:30 pm to 5:30 pm – PM2 Parallel Sessions Grand Canyon 2: Social Networks Session Chairs: Aditya Sharma (North Carolina Central University) and Chong Oh (University of Utah) Communication Clique Evolution Graph: A Tool to Monitor Conflicts in Virtual Teams Authors: Jialun Qin (University of Massachusetts Lowell) , Bin Zhu (Boston University), Mark Gaynor(Boston University) and Scott Bradner (Harvard University) Determinants of Customer Loyalty for Social Networking Services: A Comparative Study between Stayers and Switchers Authors: Rui Gu (Xi'an Jiaotong University), Lih‐Bin Oh (Xi'an Jiaotong University) and Kanliang Wang (Xi'an Jiaotong University) Campus Vs. Facebook: When Do Offline Communities Meet Online? Authors: Xue Bai (University of Connecticut) and Yuliang Yao (Lehigh University) Grand Canyon 3: Diffusion Session Chair: Dan Kim (University of Houston Clear Lake) Making inertia a diffusion drive: A case of e‐learning implementation Authors: Tsai‐Hsin Chu (National Chiayi University) and Sheng‐Fen Huang (National Chiayi University) Investigation of Group‐Based Adoption on Diffusion of Open Source Software: An Economics of Social Networks Perspective Authors: Muhammad Adeel Zaffar (University of North Carolina at Charlotte), Ram Kumar (University of NC, Charlotte ) and Kexin Zhao (University of North Carolina at Charlotte) Mindlessly Following Partly Mindless Leaders Authors: Yazgi Tutuncu(IESEG School of Management), Frank Geert Goethals (K.U.Leuven) and Chieh‐Yu Lin (Chang Jung Christian University) Grand Canyon 4: Web Intelligence Session Chair: Sachdev Vishal (University of Illinois at Urbana‐Champaign) An understanding of determinants of Web traffic Authors: Shari S. C. Shang (Chengchi University, Taiwan) ,Tzu‐Yuan Ho (Chengchi University, Taiwan) and Meng‐yu Chen (Chengchi University, Taiwan) Is the Web Page from Mars or Venus? Authors: Gautam Pant (The University of Utah) and Iljoo Kim (The University of Utah ) Mining Product Comparison Networks from Online Product Reviews Authors: Zhu Zhang (University of Arizona) and Kunpeng Zhang(Northwestern University) 14 Grand Canyon 5: Web Services and Architecture Session Chair: Karthikeyan Umapathy (University of North Florida) The Role of SOA for BPO Intention – Proposing a Research Model Authors: Daniel Beimborn (University of Bamberg ), Nils Joachim(University of Bamberg ) and Frank Schlosser (University of Bamberg ) A framework for Ontology Evaluation Authors: Jinie Pak (University of Maryland, Baltimore County ) and Lina Zhou (University of Maryland, Baltimore County ) A model‐based software architecture to support decentral product development processes Authors: Patrick Stiefel (Clausthal University of Technology) and Jorg P. Muller (Clausthal University of Technology) Grand Canyon 6: E‐Business Strategies Session Chairs: Esko Penttinen (Helsinki School of Economics) and Anupam Nath (University of North Carolina at Greensboro) Evolution of multichannel strategies of store‐based retailers in the US Authors: Thomas Adelaar (University of Amsterdam), Charles Steinfield (Michigan State University) and Stephan Idema (University of Groningen) Enterprise System Implementation: a simulation based assessment technique Authors: Salvatore Cannella (University of Palermo), José David Canca Ortiz (University of Palermo) and Elena Ciancimino (School of Engineers. University of Seville) Adoption of Identity Theft Countermeasures and Its Impact on Market Value of Global Firms Authors: Alvin Chung Man Leung (University of Texas at Austin) and Indranil Bose ( University of Hongkong) Poster Removal Time – after paper presentations 5:30 pm to 6:00 pm – Grand Canyon 6 Web 2009 / 2010 Discussion Awards by Andrew Whinston ((Honorary Chair) Best Paper / Best Poster Awards Wrap‐Up: Mike Shaw, H. R. Rao, Raj Sharman and T. S. Raghu POSTERS FOR WEB 2009 15 Information Technology Strategies for Service Innovation in a Mature Market: Case Study of the Convenience Store Industry in Taiwan Authors: Shari S. C. Shang (Department of Management Information Systems, Chengchi University, Taiwan) and Chien‐Chun Chen (Department of Management Information Systems, Chengchi University, Taiwan) Corporate Strategies of IPTV Service Providers in terms of Digital Convergence Authors: Jin Ki Kim (Korea Aerospace University) A Platform of Data Acquisition, Management, and Visualization for Empirical Research in IS Authors: Andrew Whinston (University of Texas at Austin) and Huaxia Rui ( University of Texas at Austin ) Comparing B2B Trading Mechanisms Authors: Yung‐Ming Li (National Chiao Tung University ) and Jhih‐Hua Jhang‐Li (National Chiao Tung University) Extending the Semantic Model of RFID Functionality Authors: Vic Matta (Ohio University )and David Koonce (Ohio University) A Comparison Of Web Site Analysis Techniques Authors: Horst Treiblmaier (Vienna University of Business Administration ) Agent Based Supply Chain Risk Management: A Conceptual Framework Authors: Mihalis Giannakis (Warwick Business School) Context‐aware Mobile Assistive Technology for Elderly and Visually Impaired Users Authors: Dongsong Zhang( University of Maryland, Baltimore County) and Matthew Pennington (University of Maryland, Baltimore County) Strategic computing solutions through the unification and adaptation of diverse, dynamic, and distributed computing resources: Opportunistic Agent Cloud Framework (OACF) Authors: John Hebeler ( University of Maryland, Baltimore County) and Victoria Yoon (University of Maryland, Baltimore County) Impact of trust and ethical culture on bloggers' knowledge sharing behavior Authors: Sangmi Chai (Slippery Rock University) and Minkyun Kim (University at Buffalo, SUNY, School of Management) Supporting Context‐Based Information Exploration in Competitive Intelligence Authors: Limin Zhang (North Dakota State University), Sabah Currim (Florida State University) and Faiz Currim (IOWA university) IT Deployment Patterns and Enabling Effects on Service‐Orientation of Enterprises Authors: Minder Chen (CSU Channel Islands),Shari Shang (Department of Management Information Systems, Chengchi University, Taiwan) and Yu‐Hsing Wu (National Chengchi University) Factors Influencing People to Continue Using Social Networking Site:A Perspective of Intrinsic Motivation and Social Influence Authors: Yi‐Cheng Ku (Providence University) and Han Zhang (Georgia Tech, College of 16 Management) Open Source Software: Deciding Factors and a Case Study Authors: DanZhu (Iowa State University) Finding Network Communities Using A Minimum Spanning Tree Approach Authors: Xiaobai Li(University of Massachusetts Lowell ) and Sumit Sarkar (University of Texas at Dallas) Real‐time Support for Auctioneers to Determine Optimal Clock Start for Multi‐unit Sequential Dutch Auctions Authors: Alok Gupta (University of Minnesota ), Wolfgang Ketter (Rotterdam School of Management ‐ Erasmus University ), Eric van Heck (Rotterdam School of Management ‐ Erasmus University) and Meditya Wasesa (Rotterdam School of Management ‐ Erasmus University ) Personal Event Detection in Social Networking Sites Authors: Hong Guo (University of Notre Dame ), Shengli Li (University of Florida) and Praveen Pathak (University of Florida ) 17 AM1 Parallel Sessions Time: 9:45 am to 10:45 am 18 Grand Canyon 2: Human Issues in E­Business The Impact of Gender Difference on Response Strategy in e‐Negotiation Authors: Wan Jung Lin (National Sun Yat‐sen University) , Chia‐Hua Hu (National Sun Yat‐sen University) and Hsiangchu Lai (National Sun Yat‐sen University) Gender issues have been noticed in the traditional negotiation filed for a long time as it is getting popular that women play key positions in business. However, few of the studies investigated this issue in online situation. Since online negotiation is inevitable in the global business age and its context is different from traditional face‐to‐face environment, it is valuable to have more understanding of the impact of gender difference on online negotiation. This study explores the impact of different gender dyad on how negotiators strategically respond to their counterparts’ behavior from the dyadic interaction perspective. The adopted strategy clusters include (1) distributive information, (2) integrative information, (3) claiming value and (4) creating value. Content analysis method was applied to transfer all negotiation transcripts into quantitative data, i.e. behavior units. The resulted behavior units belonging to the four strategy clusters were mined to find two‐sequence dyadic behavioral pattern of each negotiation dyad and then of each gender composition group. Finally, these two‐sequence behavioral patterns were categorized into an appropriate strategic sequence: reciprocal sequence, complimentary sequence or structural sequence. The results indicate that negotiators’ strategic responses to their counterparts were impacted by genders of both the counterparts and negotiators themselves. In general, negotiators in intra‐gender dyads adopt more structural strategy but less reciprocal strategy than in inter‐gender dyads. Compared with male, it seems that females present more response strategies. Moreover, no matter female or male, negotiator will adapt his or her response strategy based on their counterparts’ gender backgrounds. Examining VoIP Diffusion Factors: A Cross‐National Empirical Analysis Authors: Hyunmi Baek (Seoul National University) and Joongho Ahn (Seoul National University) Voice over Internet Protocol (VoIP) service market has shown impressive increase in the number of users around the world. To exploit the opportunity to expand the VoIP related market and to create competition among telecommunication operators, many countries try to activate VoIP service. To activate VoIP service, we try to find VoIP diffusion factors from a cross‐national empirical analysis in this paper. We consider five aspects ‐ regulation factors, demographic factors, telecommunications environments, infrastructure, characteristic of substitute goods ‐ to affect VoIP penetration rate. To test our hypotheses, we use one‐way ANOVA analysis and regression analysis from OECD, OVUM, UNDP, ITU data. In conclusion, we find geographical number assignment for VoIP, duty of providing emergency service, GDP per capita, broadband penetration rate and tariff of fixed and mobile call contribute to VoIP adoption. From these findings, we can derive some suggestions for VoIP activation. At first, regulation for VoIP is an important factor to affect VoIP penetration. Secondly, broadband penetration rate affects VoIP adoption whereas fixed line penetration rate does not affect VoIP adoption. Thirdly, GDP per capita is an important factor for adoption of VoIP service. Finally, contrary to expectations, tariff of PSTN and mobile is negatively related to VoIP penetration rate. We expect that a number of operators will have opportunities to understand what factors should be considered to activate VoIP services. And also, when policies about VoIP markets and related strategic models are discussed, authorities can benefit from getting proper information and theoretical backgrounds from this research. An Idealet‐Centric Scheme for Large Scale Open Innovation Systems 19 Authors: Matti Hamalainen (Helsinki University of Technology) , Qing Li (Southwestern University of Finance & Economics), Zhangxi Lin (Texas Tech University) and Alin Tomoiaga (Texas Tech University) This paper intends to demonstrate how open innovation systems could be developed by tackling the challenging knowledge management problems that are encountered when aiming at involving very large audiences. This is the case when generalizing open innovation approach beyond companies to a wider societal context like in the case of national innovation systems. The Open Innovation Banking System (OIBS) project, funded by the European Social Fund (ESF) and the participating higher education institutions in Finland, is used as a basis for our discussion. It specifically aims at bringing the largely underutilized creativity of students and senior citizens to play. Among several technologies to develop OIBS, mashups as hybrid web applications can play an important role in such constantly evolving system and contents. However, relying only on unstructured text inputs, the services of textual content sharing for OIBS would require intelligent text processing that far exceeds the capability of such applications. In this paper, we propose an “idealet”‐centric solution for representing input text data. An idealet is defined as the core knowledge about an innovative idea. The relationships among idealets and essays can be represented in a semantic network in terms of their relationships. This scheme allows the mashup applications for OIBS to more effectively retrieve, process, extract, and deliver the most important knowledge from an ocean of information contributed by participating information composer, reviewers, and users. 20 Grand Canyon 3: E Business Technologies and Standards The value of IT enabled business process standardization in the presence of market volatility Authors: Qizhi Dai (Drexel University), Robert Kauffman (Arizona State University) and Bin Wang (University of Texas‐Pan American) IT‐enabled business processes support firm agility, and business process standardization has become an essential part of IT architecture. Business process standardization value partly comes from the real options such projects enable. We propose real options theory in support of three related hypotheses on the option value of IT projects that involve primary and support business process standardization and how market volatility moderates such option value. Our research design involves the collection and coding of market announcements for firm‐level IT project initiatives that involve primary and support process standardization. We confirmed that primary business process standardization projects yielded greater option value, based on higher value for Tobin’s q in same year of the announcement, as well two years after. The two kinds of IT investment‐led business process standardization projects created more value when market volatility was higher, and this effect was even stronger for primary business processes. Analyzing Processes behind Web Service Standards Development Authors: Karthikeyan Umapathy (University of North Florida ‐ School of Computing), Sandeep Purao (Penn State University) and John Bagby (Penn State University) Anticipatory standards such as Web service standards are artifacts ‘designed’ by consortium‐based standards development organizations. Intricate processes followed to develop anticipatory standards are not well‐understood. Recently, the D‐S‐N model was developed to explain these processes, and suggested that these processes contain cycles of design (D), sense‐making (S), and negotiation (N) activities. In this paper, we provide an initial report of a case study that empirically analyzes archival documents of SOAP standard development. Our findings reveal that the D‐S‐N model is applicable to the Web service standardization process followed at W3C but this model provides only partial explanation of the process, and that design and sense‐making are the core activities of the process. Our findings also show that participants spent most of their time discussing technical issues and identifying action items to be performed, large organizations dominated the process, and negotiation is the least frequent activity. The Role of Mobile Network Operators in the Mobile Application Market Authors: Adrian Holzer(University of Lausanne) and Jan Ondrus (ESSEC Business School) 21 The mobile telecommunication market has recently been shaken by the arrival of new actors, such as Apple and Google. As a consequence, the relatively well‐established mobile network operators (MNO) have to rethink their position in this market if they want to participate in the growth of mobile telecommunication revenues. Due to fierce competition on price, mobile voice and data transmission cannot be considered as sustainable revenue streams. Mobile applications and services are being seen as great sources of revenues. However, with the current market structure, MNOs do not have a privileged position compared to the mobile platforms providers such as Apple with iTunes. In this paper, we assess whether or not there is still space in the mobile application market for MNOs. In order to do so, we examine the different roles in the mobile application value chain, point out market trends and assess how MNOs can position themselves in this turbulent new market. Our analysis shows that MNOs will have to focus on their core business as network provider and establish alliances with platform providers. 22 Grand Canyon 4: Customer Centric and Service Oriented Enterprises Factors that Affect the Adoption of Service‐Oriented Architecture in Enterprises: A Content Analysis Authors: Hsin‐Lu Chang (National Cheng Chi University) and Ying‐Ju Lee (National Cheng Chi University) Service‐oriented Architecture (SOA) paradigm is an emerging architectural blueprint which enables flexible process‐oriented application systems. While more and more enterprises plan to adopt SOA to increase reusability and flexibility of their business processes, the readiness of this technology becomes important to enterprises. However, previous SOA studies focus mainly on the technical issues but ignore the institutional ones. To fill this gap, this research aims to explore the antecedents of SOA adoption from an institutional perspective. The content analysis of online Webs, blogs, and forums indicates that several institutional factors strongly affect SOA adoption. These include the relative advantage of SOA, compatibility of SOA, the characteristics of decision makers, culture, IT capability, and SOA socioeconomic characteristics. A Framework for CRM E‐Services: From Customer Value Perspective Authors: Wei‐Lun Chang (Department of Business Administration, Tamkang University) and Yu‐Xin Wu (Department of Business Administration, Tamkang University) The global competition for enterprises has been the significant issue for recent years. However, the customer needs are difficult to satisfy due to specialized characteristic of existing customers. A good CRM strategy may assist firms to earn advanced profits, increase customer perceived value, and acquire new customers. This research aims to provide a holistic framework based on two dimensions. The first dimension is the level of customer needs which is related to customer perceived value. The second value is the process of CRM; for instance, attracting, interacting, and retaining customers. This paper intends to: (1) identify the level of needs based on perceived value, (2) recognize the possible step of CRM processes, and (3) recommend an appropriate CRM e‐service to a customer. A Personalized Preference Boundary‐Based Procedure for Recommending New Items Authors: Jae Kyeong Kim (KyungHee University), Moon Kyoung Jang (KyungHee University), Hyea Kyeong Kim (KyungHee University) and Young Ryu (University of Texas at Dallas) When new items are released, a recommender system specializing in new items can help item providers find potential customers. This study aims to develop a preference boundary‐based procedure for recommending new items. The basic principle is that if a new item belongs within the preference boundary of a target customer, then it is evaluated to be preferred by the customer. Customers' preferences and characteristics of items including new items are represented in a feature space, and the scope or boundary of the target customer's preference is extended to those of neighbors'. Diverse algorithms are suggested for the procedure, and their effectiveness is evaluated and compared by a series of experiments with a real mobile image transaction data set. The experimental results are compared, and discussions about experimental results are also given with a further research opportunity. 23 Grand Canyon 5: Economics of E­commerce Pricing Strategy and Capacity Planning in Online Games: The Design of Contracting‐out Model Authors: Yung‐Ming Li (National Chiao Tung University) and Jhih‐Hua Jhang‐Li (National Chiao Tung University) and Shu‐Wu Chuang (National Chiao Tung University) In this research, we study the digital supply chain of online game industry composed of three risk‐
neutral firms, an online game development firm, a commercial agent, and a channel firm. The online game developer can either release the online game with the help of the channel firm or contract out the online game to the commercial agent. In the former case, we examine the online game developer’s pricing strategy and capacity planning. In the later case, we observe the operations of revenue sharing contract. In addition, we also examine the degree of overselling in the digital supply chain. We find that overselling can be regarded as a strategy to compensate the loss resulting from the increasing operating cost and capacity cost when the cost of denied service is not sufficiently large. Comparing the Contracts for Digital Music Service Channels Authors: Yung‐Ming Li (National Chiao Tung University) and Jhih‐Hua Jhang‐Li (National Chiao Tung University) and Yuan Fang (National Chiao Tung University) This paper studies the impact of various business contract formats (revenue sharing and wholesale price model) on the operations of heterogeneous music service channels (CD album and online music stores). Considering the characteristics of different channels and customer preference, we compare the pricing schemes of these two types of channels under various business contracts. We find that record companies would prefer the revenue sharing contract than the wholesale price contract if they have bargaining power. This research contributes to the literature with a number of interesting practical implications on the issues of business models in the digital music services. Experimental Evaluation of Declining Buyout Price Models for Online Auctions Authors: Roumen Vragov (City University of New York), Di Shang (Baruch College, City University of New York) and Karl Lang (Baruch College, City University of New York) There is disagreement in the current auction literature on the question of whether dynamic Buy‐It‐Now (BIN) prices can increase the operational efficiency of online auctions. This paper uses experiments with economically motivated human subjects to provide an answer to this question. We report results from a study that compares the standard online auction format currently used on eBay with a new auction format (Online Linear Dutch Auction ‐ OLDA) that allows for dynamic BIN prices. We find no statistically significant differences between these two auction formats. We then compare our results with these of another study investigating OOBCA (Online One‐time BIN‐price Change Auction ‐ another auction format that allows for dynamic BIN prices), which finds that OOBCA outperforms the standard online auction format. OLDA is more dynamic in nature than OOBCA yet OOBCA outperforms a generalized static online auction design in the laboratory while the OLDA does not. This suggests that the frequency of price changes in dynamic auctions is not the only factor that influences efficiency. Other factors such as auction complexity or the way information is exchanged between buyers and sellers might be more important and should be included in future theoretical models of auctions. 24 AM2 Parallel Sessions Time: 11:15 am to 12:15 pm 25 Grand Canyon 2: Human and Workflow Issues in E­Business The effects of sense of presence, sense of belonging, and cognitive absorption on satisfaction and user loyalty toward an immersive 3d virtual world: From a first‐time second life user’s perspective Authors: Dan Kim (University of Houston ‐ Clear Lake) and Dongsong Zhang (University of Maryland, Baltimore County) Avatar‐based 3D virtual worlds such as Second Life have drawn increasing attention from users and researchers in the past few years as an emerging online environment for social, entertainment, and virtual business. However, there are very limited empirical studies that have examined the influence of social‐technological constructs (i.e., sense of presence, sense of belonging, and cognitive absorption) on users’ satisfaction and their loyalty to a virtual world. An aggregate second‐order construct that consists of multiple‐dimensions seems a reasonable approach. Moreover, due to the multi‐dimensional characteristics of socio‐technological constructs, examining those constructs needs to use more stable and reliable higher‐order measurements than before. Therefore, in this study, we empirically investigate the effect of three social‐technological constructs as multi‐dimensional second‐order construct on a first‐time user’s satisfaction with and loyalty to avatar‐based virtual world. The results and their theoretical and practical implications are also discussed. "To Stand Out or to Remain Inconspicuous”: Existence of Cross‐Cultural Communication Differences in Microblogging Authors: Chong Oh (University of Utah) This study empirically examines the existence of cross‐cultural communication differences in microblogging, a nascent communication medium on the Internet. We study Twitter, a prominent microblogging web site, to uncover whether any significant differences in communication patterns between individualistic and collectivist cultures exists. Specifically, we study users from North America and East Asia. This empirical extension of cross‐cultural research into the virtual world is a significant contribution to the theoretical literature as online communication is presently endemic and imperative to our everyday lives. In addition, this study allows practitioners to better understand how to cater to the online communication needs of users from different cultures. The study finds that online user behavior is consistent with predictions of cross‐cultural theory, and concludes that individualistic and collectivist communication differences do exist in microblogging. Should Workflow Design Adopt a Layered Process? Authors: Shaokun Fan (The University of Arizona) and J. Leon Zhao (The University of Arizona) As a relatively young field in software engineering, workflow design in the industry has not adopted a standard process similar to what has been done in database design. This is unfortunate since the three‐
layer approach in database design has been widely adopted in the industry with great benefits. However, how to standardize the workflow design process remains an open question since it is not yet widely agreeable if workflow design should adopt a layered approach and how workflow design tasks should be layered as we suggested previously. In this short paper, we argue formally for a three‐layered approach to workflow design and explore the benefits of doing so in a business context. 26 Grand Canyon 3: Multi­agent applications and context­aware architectures in E­Business Managing Supply Uncertainty with an Information Market Authors: Zhiling Guo (University of Maryland), Fang Fang (California State University) and Andrew Whinston (University of Texas at Austin) This paper proposes a market‐based information aggregation mechanism to manage the supply side uncertainty in the supply chain. We study a simple supply chain consisting of a group of manufacturers who order a homogeneous product from two suppliers. The two suppliers differ in their ability to fulfill orders – one always delivers orders and the other fulfills orders probabilistically. We model the supply chain as a Stackelberg game where the supplier who has uncertain reliability decides a wholesale price and the manufacturers who independently receive signals about the supplier’s reliability determine their sourcing strategies. We then propose an information market to trade binary contracts with payoffs contingent on the supplier’s true reliability. Under certain conditions, we show that the market‐based information aggregation improves the overall supply chain efficiency. Analyzing Market Interactions in a Multi‐agent Supply Chain Environment Authors: William Groves (University of Minnesota), John Collins (University of Minnesota) , Wolfgang Ketter (Rotterdam School of Management ‐ Erasmus University), Maria Gini (University of Minnesota) Enterprises continuously seek decision support tools that can help automate and codify business decisions. This is particularly true in the business of consumer electronics manufacturing where components are often interchangeable and several manufacturers can supply the same component over the life of a product. In this kind of dynamic environment, businesses are faced with the choice of signing long‐term (possibly quite risky) contracts or of waiting to procure necessary components on the spot market (where availability may be uncertain). Having analytical tools to analyze previous and forecast future market conditions is invaluable. We analyze a supply chain scenario from an economic perspective that involves both component procurement and sales uncertainties. The data we analyze comes from a multiagent supply chain management simulation environment (TAC SCM) which simulates a one‐year product life‐cycle. The availability of simulation logs allows us access to a rich set of data which includes the requests and actions taken by all participants in the market. This rich informational access enables us to calculate supply and demand curves, examine market efficiency, and see how specific strategic behaviors of the competing agents are reflected in market dynamics. 27 An Architecture to Support Web‐based Information Extraction Using Domain Ontologies Authors: Vijayan Sugumaran (Oakland University) and Farid Meziane (Salford University) The web is the world’s most valuable information resource. However, a wide gap has emerged between the information available for software applications vis‐à‐vis human consumption. In response to this problem, new research initiatives have focused on extracting information available on the web with machine‐processable semantics. Ontologies play a large role in information extraction, particularly in the context of semantic web, and applications should be able to find appropriate ontologies on the fly. However, existing tools do not adequately support information extraction and ontology selection. This research‐in‐progress paper presents the architecture for an information extraction system which relies on domain ontologies and lexical resources. We also provide an approach for easy identification of appropriate ontologies for a particular task. 28 Grand Canyon 4: Security Informatics Privacy and E‐Authentication: The Dangers of Self‐Disclosure in Social Networks Authors: Divakaran Liginlal (Carnegie Mellon University) and Lara Khansa (Virginia Tech) We propose a Bayesian model of privacy in e‐authentication and develop associated entropy‐based metrics. A major contribution of this work is the application of weighted entropy to characterize Internet user’s privacy preferences. Further, we model the effects of side information on privacy and relate it to self‐disclosure on Internet web sites and social networks. Specifically, our empirical study of Internet users’ information disclosure habits within social networks along with the theoretical results provides insights into building a regulatory framework to address privacy concerns in e‐authentication. On The Two Factors Affecting Hospital Information Systems Success In Disaster Context Authors: Insu Park (SUNY, Buffalo), Raj Sharman (SUNY, Buffalo), H. Raghav Rao (SUNY, Buffalo) and Shambhu Upadhyaya (SUNY, Buffalo) This study examines the impact of perceived risk and organizational resilience on information systems success process in the context of hospitals. The research model was tested with the data collected from three of the hospitals in the Western New York area that were affected by major snowstorm that was labeled on federal disaster. The results showed that: (1) perceived risk was mitigated, while organizational resilience was enhanced by systems quality and (2) perceived risk (and organizational resilience) was negatively (positively) related to information systems success factors i.e., perceived usefulness and organizational impact. Theoretical and practical implications of this study and future research directions were discussed. Understanding Attitude and Information Disclosure in Online Social Networking Authors: Richard Derham (University of Canterbury) and Annette Mills ( University of Canterbury) Online social networking sites, such as Facebook, Bebo and MySpace often require users to disclose personal information to make full use of their services. While information disclosure underlies the success of these services, such disclosures can lead to potentially damaging consequences for the individual (e.g. stalking, loss of career). The aim of this research is to explore the factors that influence an individual's willingness to disclose personal information on social networking sites despite the potential risks. Drawing on the literature on self‐disclosure to identify salient beliefs that influence information disclosure and the Theory of Planned Behavior, a framework of beliefs, attitude and behavioral intention is developed and assessed using data gathered from high school and university students. The results show that attitude towards information disclosure and its antecedents (i.e. trust and privacy concerns) are key factors influencing intention to disclose personal information. Implications and directions for future research are also discussed. 29 Grand Canyon 5: Economics of E­commerce Distinct Impact of Information Access Patterns on Non‐contractible Investments and Adaptation for Supply Chain Agility Authors: Chi‐Feng Tai (National Chiayi University), T.G. Wang (Department of Information Management, National Central University) Her‐Sen Doong (National Chiayi University) and Kai Wang(National Kaoshung University) This study explores how distinct information access patterns affect a supplier’s supply chain agility. A supplier’s specific investments for IT‐enabled supply chain coordination and relational adaptation in supply chain operations are each identified as the technical and behavioral antecedents to the supplier’s supply chain agility. Because both are non‐contractible elements in formal contracts and complementary to buyer’s supply chain coordination information and buyer’s specific investments in monitoring and control, either buyer or supplier may hold up their counterpart based on their own information assets. Therefore, this study draws on the theory of incomplete contracts and suggests that both buyer and supplier need to make their idiosyncratic information assets alienable and accessible to their counterpart so that the rent‐seeking problem can be alleviated and the supplier’s investment and adaptation incentives improved. This study contributes to the literature by demonstrating that distinct information access patterns can improve a supplier’s supply chain agility through the mediation of the non‐contractible investments and adaptation made by the supplier. 30 A Foraging Model for Human Behavior In E‐Commerce Author: Bjarne Berg (Lenoir Rhyne University ‐ University of North Carolina Charlotte) In this research in progress we are examining the impact of cognitive and demographical factors on the search behaviors of individuals engaged in on‐line purchasing. We conduct our research by both surveys and by a recorded lab experiment where 150 paid participants are asked to find and buy low cost plane tickets and car rentals. Our research builds on three theoretical constructs. From the field of biology and Optimal Foraging Theory (OFT) we are exploring the process of Patch Exhaustion to see if this process manifests itself in human foraging. From the field of economics we propose a new measure of foraging surplus based on the Rational Expectancy Hypothesis (REH) and explore what behavior and characteristics are closely linked to higher foraging surplus. From the field of Human Computer Interaction (HCI) we are leveraging existing measures for cognitive factors such as cognitive absorption (CA), personal innovativness with technology (PITT), computer playfulness (CPS) and computer self efficacy (CSE), to examine if these factors lead to significant differences in how buyers forage on eCommerce sites. We also explore the relationships between age, gender, education, prior experience, search behavior and foraging surplus. We propose a general model and classify search behavior in a variety of ways including search time (foraging costs) that a person experiences. Cost components include time to load a page, time to orient, time to enter a search, time to execute search, time to review items, time to acquire items, as well as other characteristics such as the number of items reviewed, price of items acquired relative to best known available (foraging surplus), search breath (number of sites visited) and search depth (number of pages visited). A major contribution of this research is to determine if cognitive factors in the HCI literature impacts search behavior and the decision making process as manifested by foraging costs and foraging surplus. We also expect to be able to illustrate how patch exhaustion work in humans and which traits of search behaviors leads to the higher foraging surpluses. The research should provide tangible recommendations for how to link OFT to eCommerce and may provide another framework for leveraging the substantial work done in biological animal studies over the last five decades and Pirolli’s (2007) IS work on information foraging. A Framework For Producer‐Intermediary Relationships For the Long Tail Authors: Rob Kauffman (Arizona State University), T. S. Raghu (Arizona State University) and Matt Sopha (Arizona State University) Abstract. The role of intermediaries in niche markets is distinctly different from that of intermediaries in traditional markets. Due mainly to the nature of the production of heterogeneous artisan products that comprise many niche markets, the processes and interactions between intermediaries and producers are distinct in long tail markets. Utilizing the appropriate theoretical background on traditional intermediaries and content producers, we propose a framework of the different long tail players as a means of explaining the factors that bring them together. We identify the unique descriptors of process intermediaries that make them vital to niche producers. We then apply our framework to analyze a number of interesting and characteristic cases that occur in the world of digital independent music. 31 PM1 Parallel Sessions Time: 1:30 pm to 3:00 pm 32 Grand Canyon 2: Organizational Implications of Electronic Markets Performance measurement and strategic analysis for MDBT Authors: Matteo Della Bordella (Università Carlo Cattane), Aurelio Ravarini (Università Carlo Cattane) and Rong Liu (IBM Research) The objective of this paper is to presents an Enterprise System (ES) ex ante no‐cost based evaluation technique, developed in three steps. The proposed technique enables to perform a pre‐emptive analysis of the effects of an ES implementation, based on a system of referenced non financial performance metrics. The innovativeness lies in the use of a simulation model fully integrated into the evaluation procedure. Both researchers and practitioners are expected to benefit from the presented technique. Researchers can extend it to further modelling approaches and test it on different ESs. Two quantitative tools, the Metric System Chart and the Alignment Table, provide practitioners with a measurement system that enables an exhaustive analysis of the effects of a given ES implementation and that can be joined to a financial evaluation. Assessing the effect of external pressure in interorganizational IS adoption – case electronic invoicing Authors: Esko Penttinen (Helsinki School of Economics) and Virpi Tuunainen (Helsinki School of Economics) In this research‐in‐progress, our aim is to assess the effect of external pressure in IS diffusion in inter‐
organizational settings of electronic invoicing. Electronic invoicing (e‐invoicing) has been hailed as one of the biggest savings generators for businesses in recent years. Its importance is highlighted by the attention it has received from the European Commission (EEI 2007). Benefits of e‐invoicing, as compared to the traditional paper based invoicing, include direct cost savings and relational benefits, as well as environmental benefits. However, the adoption rates in different countries have been much slower than anticipated. A number of reasons have been identified, including lack of awareness, lack of IT knowledge and capabilities, high costs of implementation (EEI 2007; Penttinen & Hyytiäinen 2008; Lempinen & Penttinen 2009). Using the metaphor of sticks and carrots, it seems that “carrot”, that is, the potential benefits to be realized by adoption and use of e‐invoicing, do not act as important enough incentives. Hence, a number of organizations, both public and private, have turned to “sticks”, in form of attempt to coerce the business partners into the practice. Based on earlier literature on diffusion of innovations, adoption of inter‐organizational information systems and institutional theory, we build a research model to empirically estimate the relative importance of external pressure in the context of an IOS implementation. We test the research model empirically through the use of data collected with a survey of recipients of a letter requesting the suppliers to deliver their invoices in electronic format in order to continue the business relationship. Our survey data will also enable comparison between requests from business partners, government units, and third‐party service providers (telecom operators and systems providers). In this research‐in‐progress paper, we present the research model, the operationalization of the constructs used in the survey instrument, and some preliminary results from the survey. 33 My How You've Grown! E‐Procurement in the Post‐dot‐bomb Era Authors: Tim McLaren (Ryerson University), Catherine Middleton (Ryerson University) and Xueying Fan (Ryerson University) This study contrasts the results of a survey on eProcurement adoption rates, success factors, and challenges conducted in 2009, with findings from prior studies. The findings suggest that many of the barriers to success identified in earlier studies (such as lack of management support) have largely been overcome, yet the technical challenges of integrating information systems and processes remain. Electronic procurement has matured significantly since its initial “peak of inflated expectations” over a decade ago. Our study suggests many firms have received significant benefits from adopting eProcurement, despite a widespread impression that eProcurement is an "overhyped" technology. In contrast to prior reports which contend eProcurement adoption is not yet widespread, our survey of 334 purchasing management professionals in Canada found that over 75% of the organizations have used eProcurement technologies for at least one year and over half have used eProcurement for at least three years. Despite initial interest in establishing multi‐supplier e‐marketplaces at the height of the dot‐
com frenzy in early 2000, our survey found that eProcurement technologies are most frequently used for purchasing‐ and single‐supplier activities and less often for payment‐ and multi‐supplier activities. Only 24% of respondents were satisfied with their organizations’ current eProcurement implementation. However, 72% of respondents felt that their organization would benefit from more usage of eProcurement. This disparity is explored using principal components analysis of the factors associated with the usage, benefits, and challenges of eProcurement. This paper concludes with a discussion of how implementation success factors may continue to evolve as the technology and business practices mature. The Effect of Positive Quadrant Dependence Between Projects on Portfolio Value Authors: John C. Burke (University of Illinois at Urbana‐Champaign) and Michael J. Shaw (University of Illinois at Urbana‐Champaign) Increasingly CIO’s are interested in managing their IT Project Portfolios centrally. This may be done for a variety of reasons, e.g. to manage costs, reduce duplication of effort, reduce the number of silos in the organization, better understand what the firm is doing, or to align their IT investments with their firm’s strategy. In particular, during this time of an economic downturn managers want to use their resources efficiently in response to tightening IT budgets. An important question then becomes how to value these projects. Real Option Analysis (ROA) has become one of the common tools used for valuing projects. However, the assumption of independence between projects often made by researchers may undervalue growth options under a wide variety of assumptions when these projects are positive quadrant dependent (PQD), a form of positive correlation. 34 Grand Canyon 3: RFID Technologies, Models, Issues and Supply Chain Management When is RFID Perceived as a Radical Technology?: Implications for Adoption and Subsequent Use Authors: Aditya Sharma (North Carolina Central University), Dominic Thomas (North Carolina Central University) and Benn Konsynski (Emory University) RFID Technology has been in existence since the 1940’s when it was used to differentiate between friendly and enemy aircraft in World War II. Its application in the business world is however relatively new. RFID has the potential to revolutionize supply chains and take product tracking to a new level. However, its adoption has been slow not only because of the higher cost of tags compared to barcodes but also because many companies have not been able to figure out how to effectively use it. In this study we focus on one of the key issues companies face when they try to evaluate RFID i.e. its radical and disruptive nature. Using data from semi‐structured interviews we build a case for why organizations may perceive RFID as a disruptive and radical technology. Perceived radicalness of a technology is presented as a second order formative with five critical dimensions. Testable hypotheses are presented for each proposed dimension and its contribution towards the “radicalness of RFID”. Remanufacturing with RFID Item‐Level Information Authors: Wei Zhou (ESCP Europe) and Selwyn Piramuthu (University of Florida) RFID technology has been widely utilized throughout supply chains across a wide spectrum of industries. However, its potential in recycling/remanufacturing has not received much attention in information systems literature. We consider RFID tags and their applications from a recycling/remanufacturing perspective and propose a novel framework to assist such process based on item‐level information visibility and instantaneous tracking/tracing ability enabled by RFID tags. We explore, analyze, and interpret relevant scenarios from this domain and provide related managerial insights. Understanding RFID Infusion in Supply Chain Authors: Xiaoran Wu (University of North Carolina at Charlotte) and Chandrasekar Subramaniam (University of North Carolina at Charlotte) 35 Drawing upon technology implementation and diffusion literature, this paper extends our understanding of Radio Frequency Identification (RFID) in a supply chain by studying RFID infusion, a stage which happens after its adoption. Our model uses the Technology‐Organization‐Environment (TOE) framework and includes economic, technical, managerial, organizational, and environmental factors as important antecedents of RFID infusion. We consider RFID infusion from three dimensions: breadth, depth, and reach, which allow us to capture the use of RFID in a more complete manner than done in previous infusion studies. In our study, we hypothesize how different antecedents, including adoption cost, complexity, compatibility, technology maturity, top management support, absorptive capability, competitive pressure, coordination, and supply chain dependency , affect the infusion of RFID in a supply chain. The model will be empirically tested with the data collected from the practitioners in the field of logistics and supply chain management. We propose to use structural equation model to test our model. Electronic Commerce On‐Site Search Services; A State Of The Art Review Authors: Nan Li (Dalhousie University), Peter Hitchcock (Dalhousie University), James Blustein (Dalhousie University) and Michael Bliemel (Dalhousie University) Many Electronic Commerce websites have vast product catalogues, which require visitors to use an on‐
site search function to find and consequently purchase the product, they desire. This paper illustrates the importance of successful on‐site searches, the main Key Performance Indicators (KPI) for on‐site searches, and introduces several popular on‐site search algorithms and techniques. 36 Grand Canyon 4: Security Informatics Software Vendors’ Patch Release Behaviors: Impact of Vulnerability Characteristics Authors: Orcun Temizkan (University of North Carolina at Charlotte), Ram. L. Kumar (University of North Carolina at Charlotte), Sungjune Park (University of North Carolina at Charlotte) and Chandrasekar Subramaniam (University of North Carolina at Charlotte) Software vulnerabilities have become a serious concern since unpatched software runs the risk of being exploited by security attackers to compromise the systems of unprotected users. There is a need for software vendors to make available timely software patches for vulnerabilities in their products. This study analyzes how vulnerability characteristics and the presence of multiple vendors affect the patch release behavior of software vendors. Based on the Confidentiality‐Integrity‐Availability (CIA) framework, we propose a model of vendor patch release behavior. Our model includes patch release time as a dependent variable. The independent variables are the presence of multiple vendors and vulnerability characteristics such as confidentiality, integrity, and availability. It also includes vulnerability disclosure as a control variable. We then use survival analysis on a data set from National Vulnerability Database (NVD) and Computer Emergency Response Team/Coordination Center (CERT/CC). Our results show that confidentiality is the most important vulnerability characteristic that affects the patch release behavior of software vendors. Higher confidentiality impact makes vendors release patches faster while higher availability impact results in slower release of patches. We also find that integrity impact of vulnerability does not affect the patch release behavior which could be due to integrity typically affecting internal operations of companies. Our results indicate that vulnerabilities affecting multiple vendors are patched earlier than vulnerabilities affecting a single vendor. We discuss the result of the analysis and its potential implications from the perspective of software security. Information Security Risks and IT Executives Structural Status in a Top Management Team: An Empirical Examination Authors: Juhee Kwon (Purdue University), Jacquelyn Rees (Purdue University) and Ta‐Wei (David) Wang (National Taiwan University) This paper empirically examines the effects of IT Executives’ structural status in Top Management Teams (TMTs) on information security risk management. E‐Business has made it imperative for IT executives to adopt cross‐functional roles due to the increased importance of securing and managing risks to information assets across the enterprise. Therefore, IT executive representation and status in a TMT is necessary to strategically and operationally conduct liaison activities between IT groups and other business units. However, there is little empirical research examining the effects of IT executives’ structural status on managing information security risks. We employ logistical regression to examine 1,462 firms from 2003 to 2008 with information security breach reports and executive compensation data. We augment this data with IT internal controls information provided by external auditors. Our results demonstrate high IT executive engagement and fair compensation are associated with reduced levels of both IT internal controls weaknesses and reported information security breaches. Second, we find that pay dispersion in a TMT increases the probability of information security breaches, while IT executives’ turnover is not significantly associated with breaches. As a comprehensive analysis across the accounting, human resources, and information systems literature, this study gives firms new insights into how they set IT executives compensation strategies as well as delegate authority and responsibility for ensuring confidentiality, integrity, and availability of information assets. 37 Impacts of Network Attacks and Vulnerability Disclosures on Information Security search behavior Authors: Jingguo Wang (University of Texas at Arlington), Nan Xiao (University at Buffalo) and H. Raghav Rao (University at Buffalo) More and more people use search engines to seek various information. This study investigates the motives that drive the search for information security knowledge via a search engine. We empirically examine the effects of network attacks and vulnerability disclosures on the frequency of search for information security knowledge. We develop our hypotheses drawing from theories in information search and information security behavior. We construct a unique dataset from publicly available sources, and use a dynamic regression model to test the hypotheses. We find that network attacks of current day and one day prior significantly impact the search, while vulnerability disclosure does not significantly affect the search. Implications of the study are discussed. 38 Grand Canyon 5: Economics of E­commerce Managing IT Portfolios with Options, Synergies, and Balances: An Integrated Approach Authors: Yu‐Ju Tu (University of Illinois at Urbana‐Champaign) and Michael J. Shaw (University of Illinois at Urbana‐Champaign) As IT portfolio management (ITPM) has been increasingly regarded as an integral part to IT governance (ITG), enterprises are faced with the challenge of well developing IT project portfolio. Evidently, the traditional way of prioritizing and selecting IT project is insufficient to meet this new challenge. We argue that IT portfolio needs to consider managerial flexibilities and interdependencies, in terms of a balanced portfolio return and volatility. Moreover, we propose a model to manage IT project portfolio based on the real‐options, synergy, and modern portfolio theories. From our provided example, we reflect the impacts of deferral option and cost synergy on the portfolio efficient composition. Open Innovation in Platform Competition Authors: Mei Lin (The University of Hong Kong), Xuqing Ke (The University of Texas at Austin) and Andrew Whinston (The University of Texas at Austin) We examine the competition between a proprietary platform and an open platform, where each platform holds a two‐sided market consisted of app developers and users. While the competing platforms have the similar business models for their application marketplace, the open platform cultivates an innovative environment by making the source code of its operating system available to the public, which encourages participation in both its application marketplace and third‐party application development. We use a game theoretic model to capture this competitive phenomenon and found the openness factor to shift both platforms' equilibrium membership fees in the same direction. However, the membership fee of the open platform increases or falls more sharply than that of the proprietary platform. User Discrimination and Net Neutrality Authors: Hong Guo (University of Notre Dame), Subhajyoti Bandyopadhyay (University of Florida) and Hsing Cheng (University of Florida) 39 The net neutrality debate has brought out economic rationale for and against a variety of proposals of the broadband service providers (BSPs) to differentiate among different classes of users. Broadband users are characterized by the differing amounts of content they request online, as well as their valuation for such content. A BSP has two potential instruments for user discrimination – price discrimination and traffic prioritization (or degradation). We model four different pricing and prioritization options that cover many of the strategies that actual BSPs have adopted in the marketplace. By comparing these options, we find that imposing net neutrality may decrease the BSP’s profit. If net neutrality is not imposed, however, the BSP might degrade the heavy users or charge them more for a preferential data delivery depending on the various parameter values. These results are useful both for the broadband service providers as they mull over the introduction of the different pricing strategies and for policymakers who are dealing with the net neutrality issue. Competition Between Open Source And Proprietary Software: A Network Externality Analysis Authors: Yipeng Liu (University of Scranton) and Hsing Cheng (University of Florida) We build analytical models to examine the impact of network externalities on the competition between open source software (OSS) and proprietary software. When the market is fully covered, the installed base and the profit of proprietary software increase at the expense of decreasing user base for OSS in the presence of network externalities. We find that a threshold corresponding to the quality ratio between OSS and proprietary software can be derived such that if the network effect intensity of the OSS is greater than that of the proprietary software multiplied by this threshold value, then OSS benefits from the presence of network externality; Finally, we find that making software products compatible with competing rival is not desirable by proprietary software vendors but highly favored by OSS venders. 40 PM2 Parallel Sessions Time: 4:30 pm to 5:30 pm Grand Canyon 2: Social Networks Communication Clique Evolution Graph: A Tool to Monitor Conflicts in Virtual Teams 41 Authors: Jialun Qin (University of Massachusetts Lowell) , Bin Zhu (Boston University), Mark Gaynor(Boston University) and Scott Bradner (Harvard University) Intra‐team conflicts are usually inevitable. How a team handles team conflicts will greatly affect the performance of that team. Therefore, it is crucial for team leaders and organization managers to be able to monitor the evolution of the conflicts in teams so that they can intervene before it is too late. However, no existing network visualization system serves this purpose. In this paper, we introduced a new tool called Communication Clique Evolution Graph (CCEG) that combines social network structure analysis and information visualization to support the monitor of conflicts in virtual teams. The pilot study we conducted on the email archive of 12 virtual teams showed that the CCEG is an effective tool to detect and monitor conflicts in teams. Determinants of Customer Loyalty for Social Networking Services: A Comparative Study between Stayers and Switchers Authors: Rui Gu (School of Management, Xi'an Jiaotong University), Lih‐Bin Oh (School of Management, Xi'an Jiaotong University) and Kanliang Wang (School of Management, Xi'an Jiaotong University) Although customer loyalty has been widely examined in various Internet contexts, the conceptualization and empirical validation of a customer loyalty model for social networking sites (SNSs) has not been addressed adequately. This study attempts to shed light on the determinants of customer loyalty for SNS. We propose a theoretical model comprising of relational bonds, perceived value, satisfaction, and customer knowledge as antecedents of SNS customer loyalty. The model will be empirically tested using data collected from SNS users in China. We will conduct a comparative analysis to examine the differences between stayers, satisfied switchers and dissatisfied switchers. The potential theoretical and managerial contributions are discussed. Campus vs. Facebook: When Do Offline Communities Meet Online? Authors: Xue Bai (University of Connecticut) and Yuliang Yao (Lehigh University) 42 While a large body of research has studied issues associated with online communities, little research has systematically examined the interaction between an online community and its offline counterpart. Our study is the first such step to fill this literature gap. Using data gathered about American 100 universities, we examine the impact of the characteristics of campus communities on their friendship networks on Facebook. The university setting and its corresponding networks on Facebook provide us with a controlled research setting where we can isolate the effect of a number of characteristics of offline communities on its corresponding online communities. Our results suggest that offline and online social communities are complements and herding effect exists for users to participate in online community. The results also suggest that greater use of online community is associated with higher cost for offline social interaction, indicating that cost for offline social interaction is a key determinant for the use of online community. Our findings shed light on social interaction theories in the emerging inter‐
connected online and offline communities. Grand Canyon 3: Diffusion 43 Making inertia a diffusion drive: A case of e‐learning implementation Authors: Tsai‐Hsin Chu (National Chiayi University) and Sheng‐Fen Huang (National Chiayi University) Successfully introducing a technological innovation into an organization requires the employees to change current practices and to adopt a new work mode. Current research suggests that inertia demonstrates resistance to change. This study attempts to reflect upon this premise by reporting a case in which diffusion strategies are built upon employee inertia. Utilizing the lens of robust design, our research question is: how could inertia be leveraged to facilitate successful diffusion of an technological innovation? The investigation is based on a case study of the diffusion of an e‐learning system within a long‐established, family‐run pharmaceutical company in Taiwan. Our findings suggest that successful diffusion occurs when the design of the implementation strategy is able to blend in with employees’ local understanding of work practice. We explain the diffusion patterns present in three business units by showing how the local rules and understandings embedded in work practices are adapted and leveraged. Investigation of Group‐Based Adoption on Diffusion of Open Source Software: An Economics of Social Networks Perspective Authors: Muhammad Adeel Zaffar (University of North Carolina at Charlotte),Ram Kumar(University of NC, Charlotte ) and Kexin Zhao(University of North Carolina at Charlotte) There is growing emphasis on global collaboration in the business world and greater interdependence between organizations while making technology adoption decisions. Therefore, it is imperative to develop an understanding of the effect of inter‐organizational relationships or network structure on the social behavior of organizations and their economic outcomes. In this paper, while considering open source software (OSS) as an exemplar, an investigation of diffusion of OSS versus PS (proprietary software) is proposed, based on the literature on social networks. The objective is to understand what determines the strategic importance of groups of firms within a network and can that knowledge be exploited by software vendors and third‐party software providers to kick‐start or drive network‐wide diffusion of software. Preliminary results from an agent‐based simulation suggest that a) in some cases strategically situated groups of nodes in a network can significantly affect the diffusion of OSS; b) the measure of strategic importance of these groups in the context of software diffusion is dependent on other factors such as network topology and network density; c) in selected cases lack of knowledge regarding the strategic position of groups within a network does not confer any additional benefits to vendors in driving diffusion of OSS. The paper concludes with some research and practitioner insights based on these preliminary findings. Mindlessly Following Partly Mindless Leaders 44 Authors: Yazgi Tutuncu(IESEG School of Management), Frank Geert Goethals (K.U.Leuven) and Chieh‐Yu Lin (Chang Jung Christian University) This paper studies drivers for RFID (Radio Frequency IDentification) adoption. The mindlessness/mindfulness theory is applied to the context of RFID implementation decisions. Several types of mindless and mindful decision making drivers are put forward. Hypotheses are tested using a questionnaire that was answered by 122 Chinese companies. The data shows mixed support for the applicability of the mindlessness/mindfulness theory. Companies which notice other companies adopt RFID technology are motivated to adopt the technology as well. Late RFID implementers seem to take decisions more mindlessly than early RFID implementers. Still, early RFID implementers also take decisions mindlessly. Neither late implementers nor early implementers can be qualified as being fully mindless: both groups also take decisions mindfully. 45 Grand Canyon 4: Web Intelligence An understanding of determinants of Web traffic Authors: Shari S. C. Shang (Department of Management Information Systems, Chengchi University, Taiwan) ,Tzu‐Yuan Ho (Department of Management Information Systems, Chengchi University, Taiwan) and Meng‐yu Chen (Department of Management Information Systems, Chengchi University, Taiwan) In the internet era, the most significant issue for platform operators is how to design and manage the virtual platform to increase the Web traffic flow. The diversity of online services that offer information and discussion through Internet forums allows real estate agents to provide product knowledge through different kinds of virtual communities. For example, consumers can search for, purchase, and sell real estate items through these virtual platforms. Consequently, virtual service providers endeavor to enhance platform operation and service quality to attract visitors. Based on previous literature and empirical cases, this study analyzes the causes and effects of Web traffic. A few traffic‐affecting factors are identified, which include content management, marketing strategies, promotion strategies, and business models. Next, five different types of real estate industry websites in Taiwan are selected for multiple case studies. The cross‐case analysis reveals that all companies incorporate search engines, keywords, and Search Engine Optimization to enhance users’ access to the websites. Therefore, the advertising effort seems to be the key determinant for boosting website traffic. Based on the preliminary findings regarding the determinants of web traffic, an extended study is planned to analyze both customer needs and behavior on the same platform in order to obtain a more complete understanding regarding effective management of the virtual service platform. Comparison Networks from Online Product Reviews Authors: Zhu Zhang (University of Arizona) and Kunpeng Zhang (Northwestern University) By mining pairwise product comparison relationships hidden in online product reviews and integrating them in a directed graph, we propose the product comparison network as a new computational construct that characterizes a product competition landscape. We also illustrate the empirical implications in e‐commerce settings through experiments on an Amazon dataset. Is the Web Page from Mars or Venus? Authors: Gautam Pant (The University of Utah) and Iljoo Kim (The University of Utah ) 46 The World Wide Web continues to grow rapidly in terms of both content and users. The Web is also a dynamic medium that changes continuously as its billions of pages are updated or deleted, and new ones are added. The size and dynamism of the Web poses challenges for all its stakeholders which includes producers of content, consumers of content, and advertisers who want to place advertisements next to relevant content. As the number of consumers and the time they spend browsing online continues to increase, the importance of online advertising is expected to grow rapidly as well. A critical information for producers/publishers of content as well as advertisers is the demographics of the consumers who are likely to visit a given web page. For advertisers or advertising exchanges, such information could lead to better ad placements. For content producers, it provides opportunities to better understand the potential consumers and internalize this knowledge in terms of web site design. In this paper we ask the question: Is it possible to deduce the demographics of the audience of a page based solely on the content of the page? We explore this question with predictive models that use a non‐parametric bayesian approach and find that it is indeed possible to effectively predict different types of demographics (gender, age, income, education) of consumers of web pages based on the content of those pages. 47 Grand Canyon 5: Web Services and Architecture The Role of SOA for BPO Intention – Proposing a Research Model Authors: Daniel Beimborn (University of Bamberg), Nils Joachim (University of Bamberg ) and Frank Schlosser(University of Bamberg ) Outsourcing business activities? Since one of the promises of SOA is to modularize the IT representation of business processes, it should facilitate business process outsourcing in terms of buying the provision of single business functionalities. In this paper, we develop a conceptual research model that theorizes the relationship between SOA and BPO intention. A framework for Ontology Evaluation Authors: Jinie Pak (University of Maryland, Baltimore County ) and Lina Zhou (University of Maryland, Baltimore County ) The rapid growth in the number of ontologies has not met with the wide adoption in practice. Ontology evaluation can help improve the use of ontologies by comparing different ontologies. Despite that a host of ontology evaluation methodologies are available, many current approaches and methods to ontology evaluation are fragmentary and tied to its development methodologies. Based on a review of current ontology evaluation methods, this research proposes a framework for ontology evaluation. The framework lays the groundwork for developing a comprehensive approach to ontology evaluation, addressing both basic ontology dimensions and concrete criteria. A model‐based software architecture to support decentral product development processes Authors: Patrick Stiefel (Clausthal University of Technology) and Jorg P. Muller (Clausthal University of Technology) The cross‐organizational, cooperative product development needs adaptive and open platforms for integration that scale well and provide an intelligent environment especially in regard to definition and design. Based on these requirements our research focuses on how decentral information technology can further the processes especially needed for cooperative product development (CPD). We therefore follow a model driven development (MDD) approach, but it is still an open research question how requirements for that approach in a decentral development process should be reconciled with the potential of decentralized IT systems (especially in P2P environments). This paper presents methods and models which have been hardly taken into consideration by existing centralized collaborative systems. We aim to provide the basics for the next generation of loosely coupled cooperative systems for cross‐
organizational cooperative product development. 48 Grand Canyon 6: eBusiness Strategies Evolution of multichannel strategies of store‐based retailers in the US Authors: Thomas Adelaar (University of Amsterdam), Charles Steinfield (Michigan State University) and Stephan Idema (University of Groningen) The goal of this paper is to study retailers over time and along product classification to assess its effects on the variations in multichannel retailing. This enhances our view on the strategic opportunities regarding the implementation of e‐commerce strategies and management of channel portfolios. The results can help managers to assess their positioning along search and experience goods, and use it to learn from novel multichannel usages within their own and product‐related industries. It further helps managers to determine their competencies and to gain insight into available options of multichannel strategies that best fit the type of products sold and available resources and capabilities. Enterprise System Implementation: a simulation based assessment technique Authors: Salvatore Cannella (University of Palermo), José David Canca Ortiz (University of Palermo) and Elena Ciancimino (School of Engineers. University of Seville) The objective of this paper is to presents an Enterprise System (ES) ex ante no‐cost based evaluation technique, developed in three steps. The proposed technique enables to perform a pre‐emptive analysis of the effects of an ES implementation, based on a system of referenced non financial performance metrics. The innovativeness lies in the use of a simulation model fully integrated into the evaluation procedure. Both researchers and practitioners are expected to benefit from the presented technique. Researchers can extend it to further modelling approaches and test it on different ESs. Two quantitative tools, the Metric System Chart and the Alignment Table, provide practitioners with a measurement system that enables an exhaustive analysis of the effects of a given ES implementation and that can be joined to a financial evaluation. Adoption of Identity Theft Countermeasures and Its Impact on Market Value of Global Firms Authors: Alvin Chung Man Leung (University of Texas at Austin) and Indranil Bose (University of Hongkong) Identity thefts have long plagued the e‐commerce industry. Many companies have considered adopting relevant countermeasures. Using the event study methodology, this research analyzes the returns of investment of such adoption. The research results show that announcements associated with US companies and the financial services industry are rewarded more generously by investors. This research may contribute to the understanding of market return of adoption of anti‐identity theft measures and thus facilitate industrial practitioners to make better investment decisions about such measures. Apart from traditional CAPM model, which has been widely adopted in the IS literature, we also use the Fama‐
French 3‐factor model and another model that considers global market movements to support the findings. This research aims to enrich the growing event study literature in the IS area and provide useful guidelines regarding adoption of anti‐identity theft measures for companies. 49 Our Sponsors 50