The distributed usage of computing resources over a large-scale network allows users to receive a... more The distributed usage of computing resources over a large-scale network allows users to receive and offer resources on demand. The on demand paradigm leads to dynamic and unpredictable usage of resources, since every user in the network will try to maximize his utility by selfish behavior. The customer's behavior can be actuated by pricing policies to lower demand at peak
We study an application services supply chain consisting of one Application Service Provider (ASP... more We study an application services supply chain consisting of one Application Service Provider (ASP) and one Application Infrastructure Provider (AIP). The AIP supplies the computer capacity to the ASP that in turns sells the value-added application services to the market. The market is characterized by a price-sensitive random demand. The ASP’s objective is to determine the optimal price of its service to the market and the optimal capacity to purchase from the AIP. The AIP’s goal on the other hand is to maximize its profit from selling the capacity to the ASP. In this paper, we examine the supply chain’s performance under different coordination strategies involving risk and information sharing between the ASP and the AIP. We find several key managerial insights from out model. Most importantly, we find an effective decentralized mechanism to achieve the goal of maximizing the overall supply chain performance. Absent this effective mechanism, we find that it is better to let the play...
Growth in the outsourcing of IT services has led many organizations to enter into negotiated cont... more Growth in the outsourcing of IT services has led many organizations to enter into negotiated contractual agreements with both internal and external service providers known as information technology service level agreements (IT SLAs). To further empirical research into IT SLAs, we present a methodological approach based on the theory of conceptual spaces that allows the content of these negotiated agreements to be analyzed and compared geometrically using vector representation. The outcome of such an analysis is a set of distance measures by which defensible statements regarding the similarity of IT SLAs can be made. We also discuss how the comparisons provide insights for IT SLA negotiation researchers that go beyond alternate empirical and analytic methods. The implications of these comparisons are discussed with a specific focus on research methods that can foster cumulative empirical investigation of IT SLA negotiation support system requirements.
Reviews the current state of the development of sustainable IT services. • Discusses the factors ... more Reviews the current state of the development of sustainable IT services. • Discusses the factors driving the development of green and sustainable IT. • Examines the sustainability dimensions of IT: service, temporal, cost, organizational, economic, environmental and societal sustainability. • Discusses the corporate sustainability, social responsibility and IT. • Summarizes the service-dominant logic with business, customer and societal values. • Discusses the steps to integrate sustainable IT with business strategy. • Explores the best practices from major IT to non-IT companies. • Recommends a set of guidelines for sustainable IT services development.
Given the dominance of services in most advanced economies, organizations seeking to grow must re... more Given the dominance of services in most advanced economies, organizations seeking to grow must rely on service innovation for continued business success. Manufacturers, in particular, are becoming increasingly dependent on services as extensions of their product models or remaking themselves into service companies. However, most improvements to services are incremental and often "me too" in nature. It is relatively rare and difficult for a company to develop a service that creates an entirely new market space or reshapes an existing market. Those companies that can create or redefine markets have the potential to make the competition irrelevant and gain significant competitive advantage. Market creating factors include core benefits vs. delivery benefits, separable vs. inseparable service dimensions, and marketing strategy approaches that can leverage disruptive value to create uncontested market space. To illustrate these concepts, this paper explores the service innovati...
In today's competitive business world, the amount of information assets you have and how you ... more In today's competitive business world, the amount of information assets you have and how you use it makes a big difference for company's competitive advantage. Marketing departments have the challenge of selling products, or acquiring and retaining clients for services within budget constraints. Identification of the target group is a task that needs to be well thought out to minimize acquisition cost and to maximize return on investment. Determining the right product and service for the target group through the right channel is also very important. This tutorial provides an overview of using information services for advanced marketing. It also provides a basic understanding of how to plan, design, evaluate, successfully refine predictive models, and include this process as part of corporate strategy for competitive advantage. The same process can be followed for other business units like fraud, customer management, retention, pricing and risk management.
PICMET '09 - 2009 Portland International Conference on Management of Engineering & Technology, 2009
Computerized physician order entry (CPOE) is a technology that has been praised for its ability t... more Computerized physician order entry (CPOE) is a technology that has been praised for its ability to reduce medical errors and medical costs. Recent studies suggest that healthcare providers believe that this praise is justified and that CPOE actually does help to increase patient safety. However, the penetration of CPOE within the healthcare industry remains low. This study offers insight into
International Journal of Electronic Commerce, 2010
ABSTRACT This study explores how third-party assurance seals, a privacy service provided by vendo... more ABSTRACT This study explores how third-party assurance seals, a privacy service provided by vendors to mitigate customers' fears, has an impact on on-line customer satisfaction and repeat-purchase intention. It asks the following research questions: Do assurance ...
International Journal of Service Science, Management, Engineering, and Technology, 2010
... Paper, 2001). The reasons have become clear. Potential customers, both business and consumer,... more ... Paper, 2001). The reasons have become clear. Potential customers, both business and consumer, perceive LBS to be complex, costly, and offering insufficient value to warrant adoption (The Economist, 2006). However, with ...
Research on the agile and adaptive enterprise promotes real time dashboards as a powerful tool to... more Research on the agile and adaptive enterprise promotes real time dashboards as a powerful tool to provide coordination and control. Recent trends in market volatility have led firms to restructure around what organizational theorists term an “adhocracy”. Service oriented architecture represents an emerging architectural mechanism to align an organization’s processes with the flexible structure of such an organizational form. A theory of dashboard creation and implementation that addresses the organizational characteristics of an adhocracy (as exposed through the formalism of a service oriented architecture) is needed in order to develop a grounded methodology for dashboard creation and implementation that targets the coordination and control requirements of this evolving organizational structure. This research seeks to provide such a theoretical foundation grounded in the context of two diverse case studies. Cementing a theory base for dashboard creation and implementation helps to ...
This paper describes a methodology for planning and executing software development projects based... more This paper describes a methodology for planning and executing software development projects based on the service-oriented paradigm called Service-Oriented Software Development (SOSD). This does not refer to a methodology for developing software services or service-oriented architectures. Rather, it is a method for managing the process of software development in a service-oriented approach in which the actions performed by individuals and groups are modeled as “services” which can be choreographed and orchestrated. SOSD has been adopted informally by many organizations in various forms and it runs somewhat contrary to some of the recent trends toward agile development methodologies. Interestingly, it performs well in certain situations where agile methods tend to break down. In addition to describing the basics of SOSD and its theoretical underpinnings, we outline its benefits and potential shortcomings. As evidence, project data is provided from a Fortune 500 company which has gradu...
2007 40th Annual Hawaii International Conference on System Sciences (HICSS'07), 2007
ABSTRACT The fulfillment of e-Government visions is dependent of and leads to increased vertical ... more ABSTRACT The fulfillment of e-Government visions is dependent of and leads to increased vertical and horizontal integration of government operations and services. E-government leverages the IT infrastructures to create new kinds of applications and services. A poorly designed infrastructure can block interoperability and severely hinder the migration towards e-government. E-Government information systems (EGIS) are increasingly interlinked using the physical network infrastructure. In addition, the IT infrastructure contains more and more services for supporting interoperability and communication. The demand for communication and collaboration between organizations as well as interoperability among systems is steadily increasing. Therefore, business processes and supporting IT infrastructures need to be enhanced, redesigned, streamlined, interfaced, and integrated across various governmental levels and branches presumably leading to gains in internal effectiveness and efficiency as well as to improved internal and external services.
ABSTRACT To qualify as truly innovative, new IT applications must successfully achieve customer v... more ABSTRACT To qualify as truly innovative, new IT applications must successfully achieve customer value cocreation, adoption, and acceptance. Without this, a new technology isn't an innovation; it's just a failed product or service that didn't gain traction. We're now well into an era in which significant competitive advantage is achievable from IT-enabled business innovation. This special issue was conceived as a vehicle for understanding some of today's issues and for looking at opportunities for tomorrow. The authors' contributions in all the articles have implications for IT-enabled innovations that go beyond the immediate application settings on which they report. A video discussing emerging service innovations is available at http://youtu.be/4xBRfWt20-I.
Proceedings of the 38th Annual Hawaii International Conference on System Sciences, 2005
... Second, the workflow engine itself can be decentralized so that the workload can be distribut... more ... Second, the workflow engine itself can be decentralized so that the workload can be distributed ... Should this occur, the external checkpoint location can immediately restart the agent since it maintains the ... [9, 10] have both analyzed the performance cost of checkpointing, but from ...
Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS'06), 2006
... Daniel S. Soper*, Haluk Demirkan, Michael Goul, and Robert St. Louis Department of Informatio... more ... Daniel S. Soper*, Haluk Demirkan, Michael Goul, and Robert St. Louis Department of Information Systems, WP Carey School of Business, PO Box 874606 Arizona State University, Tempe, AZ 85287-4606 * Corresponding Author E-Mail: Daniel.Soper@asu.edu Abstract ...
The distributed usage of computing resources over a large-scale network allows users to receive a... more The distributed usage of computing resources over a large-scale network allows users to receive and offer resources on demand. The on demand paradigm leads to dynamic and unpredictable usage of resources, since every user in the network will try to maximize his utility by selfish behavior. The customer's behavior can be actuated by pricing policies to lower demand at peak
We study an application services supply chain consisting of one Application Service Provider (ASP... more We study an application services supply chain consisting of one Application Service Provider (ASP) and one Application Infrastructure Provider (AIP). The AIP supplies the computer capacity to the ASP that in turns sells the value-added application services to the market. The market is characterized by a price-sensitive random demand. The ASP’s objective is to determine the optimal price of its service to the market and the optimal capacity to purchase from the AIP. The AIP’s goal on the other hand is to maximize its profit from selling the capacity to the ASP. In this paper, we examine the supply chain’s performance under different coordination strategies involving risk and information sharing between the ASP and the AIP. We find several key managerial insights from out model. Most importantly, we find an effective decentralized mechanism to achieve the goal of maximizing the overall supply chain performance. Absent this effective mechanism, we find that it is better to let the play...
Growth in the outsourcing of IT services has led many organizations to enter into negotiated cont... more Growth in the outsourcing of IT services has led many organizations to enter into negotiated contractual agreements with both internal and external service providers known as information technology service level agreements (IT SLAs). To further empirical research into IT SLAs, we present a methodological approach based on the theory of conceptual spaces that allows the content of these negotiated agreements to be analyzed and compared geometrically using vector representation. The outcome of such an analysis is a set of distance measures by which defensible statements regarding the similarity of IT SLAs can be made. We also discuss how the comparisons provide insights for IT SLA negotiation researchers that go beyond alternate empirical and analytic methods. The implications of these comparisons are discussed with a specific focus on research methods that can foster cumulative empirical investigation of IT SLA negotiation support system requirements.
Reviews the current state of the development of sustainable IT services. • Discusses the factors ... more Reviews the current state of the development of sustainable IT services. • Discusses the factors driving the development of green and sustainable IT. • Examines the sustainability dimensions of IT: service, temporal, cost, organizational, economic, environmental and societal sustainability. • Discusses the corporate sustainability, social responsibility and IT. • Summarizes the service-dominant logic with business, customer and societal values. • Discusses the steps to integrate sustainable IT with business strategy. • Explores the best practices from major IT to non-IT companies. • Recommends a set of guidelines for sustainable IT services development.
Given the dominance of services in most advanced economies, organizations seeking to grow must re... more Given the dominance of services in most advanced economies, organizations seeking to grow must rely on service innovation for continued business success. Manufacturers, in particular, are becoming increasingly dependent on services as extensions of their product models or remaking themselves into service companies. However, most improvements to services are incremental and often "me too" in nature. It is relatively rare and difficult for a company to develop a service that creates an entirely new market space or reshapes an existing market. Those companies that can create or redefine markets have the potential to make the competition irrelevant and gain significant competitive advantage. Market creating factors include core benefits vs. delivery benefits, separable vs. inseparable service dimensions, and marketing strategy approaches that can leverage disruptive value to create uncontested market space. To illustrate these concepts, this paper explores the service innovati...
In today's competitive business world, the amount of information assets you have and how you ... more In today's competitive business world, the amount of information assets you have and how you use it makes a big difference for company's competitive advantage. Marketing departments have the challenge of selling products, or acquiring and retaining clients for services within budget constraints. Identification of the target group is a task that needs to be well thought out to minimize acquisition cost and to maximize return on investment. Determining the right product and service for the target group through the right channel is also very important. This tutorial provides an overview of using information services for advanced marketing. It also provides a basic understanding of how to plan, design, evaluate, successfully refine predictive models, and include this process as part of corporate strategy for competitive advantage. The same process can be followed for other business units like fraud, customer management, retention, pricing and risk management.
PICMET '09 - 2009 Portland International Conference on Management of Engineering & Technology, 2009
Computerized physician order entry (CPOE) is a technology that has been praised for its ability t... more Computerized physician order entry (CPOE) is a technology that has been praised for its ability to reduce medical errors and medical costs. Recent studies suggest that healthcare providers believe that this praise is justified and that CPOE actually does help to increase patient safety. However, the penetration of CPOE within the healthcare industry remains low. This study offers insight into
International Journal of Electronic Commerce, 2010
ABSTRACT This study explores how third-party assurance seals, a privacy service provided by vendo... more ABSTRACT This study explores how third-party assurance seals, a privacy service provided by vendors to mitigate customers' fears, has an impact on on-line customer satisfaction and repeat-purchase intention. It asks the following research questions: Do assurance ...
International Journal of Service Science, Management, Engineering, and Technology, 2010
... Paper, 2001). The reasons have become clear. Potential customers, both business and consumer,... more ... Paper, 2001). The reasons have become clear. Potential customers, both business and consumer, perceive LBS to be complex, costly, and offering insufficient value to warrant adoption (The Economist, 2006). However, with ...
Research on the agile and adaptive enterprise promotes real time dashboards as a powerful tool to... more Research on the agile and adaptive enterprise promotes real time dashboards as a powerful tool to provide coordination and control. Recent trends in market volatility have led firms to restructure around what organizational theorists term an “adhocracy”. Service oriented architecture represents an emerging architectural mechanism to align an organization’s processes with the flexible structure of such an organizational form. A theory of dashboard creation and implementation that addresses the organizational characteristics of an adhocracy (as exposed through the formalism of a service oriented architecture) is needed in order to develop a grounded methodology for dashboard creation and implementation that targets the coordination and control requirements of this evolving organizational structure. This research seeks to provide such a theoretical foundation grounded in the context of two diverse case studies. Cementing a theory base for dashboard creation and implementation helps to ...
This paper describes a methodology for planning and executing software development projects based... more This paper describes a methodology for planning and executing software development projects based on the service-oriented paradigm called Service-Oriented Software Development (SOSD). This does not refer to a methodology for developing software services or service-oriented architectures. Rather, it is a method for managing the process of software development in a service-oriented approach in which the actions performed by individuals and groups are modeled as “services” which can be choreographed and orchestrated. SOSD has been adopted informally by many organizations in various forms and it runs somewhat contrary to some of the recent trends toward agile development methodologies. Interestingly, it performs well in certain situations where agile methods tend to break down. In addition to describing the basics of SOSD and its theoretical underpinnings, we outline its benefits and potential shortcomings. As evidence, project data is provided from a Fortune 500 company which has gradu...
2007 40th Annual Hawaii International Conference on System Sciences (HICSS'07), 2007
ABSTRACT The fulfillment of e-Government visions is dependent of and leads to increased vertical ... more ABSTRACT The fulfillment of e-Government visions is dependent of and leads to increased vertical and horizontal integration of government operations and services. E-government leverages the IT infrastructures to create new kinds of applications and services. A poorly designed infrastructure can block interoperability and severely hinder the migration towards e-government. E-Government information systems (EGIS) are increasingly interlinked using the physical network infrastructure. In addition, the IT infrastructure contains more and more services for supporting interoperability and communication. The demand for communication and collaboration between organizations as well as interoperability among systems is steadily increasing. Therefore, business processes and supporting IT infrastructures need to be enhanced, redesigned, streamlined, interfaced, and integrated across various governmental levels and branches presumably leading to gains in internal effectiveness and efficiency as well as to improved internal and external services.
ABSTRACT To qualify as truly innovative, new IT applications must successfully achieve customer v... more ABSTRACT To qualify as truly innovative, new IT applications must successfully achieve customer value cocreation, adoption, and acceptance. Without this, a new technology isn't an innovation; it's just a failed product or service that didn't gain traction. We're now well into an era in which significant competitive advantage is achievable from IT-enabled business innovation. This special issue was conceived as a vehicle for understanding some of today's issues and for looking at opportunities for tomorrow. The authors' contributions in all the articles have implications for IT-enabled innovations that go beyond the immediate application settings on which they report. A video discussing emerging service innovations is available at http://youtu.be/4xBRfWt20-I.
Proceedings of the 38th Annual Hawaii International Conference on System Sciences, 2005
... Second, the workflow engine itself can be decentralized so that the workload can be distribut... more ... Second, the workflow engine itself can be decentralized so that the workload can be distributed ... Should this occur, the external checkpoint location can immediately restart the agent since it maintains the ... [9, 10] have both analyzed the performance cost of checkpointing, but from ...
Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS'06), 2006
... Daniel S. Soper*, Haluk Demirkan, Michael Goul, and Robert St. Louis Department of Informatio... more ... Daniel S. Soper*, Haluk Demirkan, Michael Goul, and Robert St. Louis Department of Information Systems, WP Carey School of Business, PO Box 874606 Arizona State University, Tempe, AZ 85287-4606 * Corresponding Author E-Mail: Daniel.Soper@asu.edu Abstract ...
Uploads
Papers