Matching Items (3)
Filtering by

Clear all filters

151049-Thumbnail Image.png
Description
The e-Retail industry has grown rapidly over the last few years and is projected to continue its upward trend as consumers shift from traditional channels to online channels. In March 2010, Forrester Research forecasted that online retail sales will grow by 10% a year for the next 5 years and

The e-Retail industry has grown rapidly over the last few years and is projected to continue its upward trend as consumers shift from traditional channels to online channels. In March 2010, Forrester Research forecasted that online retail sales will grow by 10% a year for the next 5 years and e-Retail sales will amount to $249 billion by 2014. With intense competition for market share and profits, information systems and technology (IST) sourcing decisions are becoming increasingly important to e-Retail firms to support continued growth and market responsiveness. There are several aspects for e-Retailers to consider when formulating its IST sourcing strategy. Whether to choose make versus buy for technology assets and services has been addressed in both strategy and IS literature (Handfield et al. 1999, Leiblein et al. 2002, Wade and Hulland, 2004). Then there is the follow-up question of selecting a best-of-breed strategy or tighter partnership with a select group of vendors (Clemons et al. 1993, Kauffman and Tsai 2009). Few studies have looked at IST sourcing or proposed models and frameworks for evaluating IST sourcing decisions (Saarinen and Vepsalainen, 1994). Furthermore, these existing studies mainly address the antecedents of the decisions but not so much on their performance effects (Kauffman and Tsai 2009; Smith et al., 1998). The goal of this study is to extend the knowledge of IST sourcing for e-Retailers, a topic which has received limited attention (Kishore et al., 2004), by addressing a core problem: How should an e-Retailer develop and implement its IST sourcing strategy to accommodate the increase in consumer demand and IT complexity but still achieve high performance? The study introduces two theoretical models to examine organizational factors that influence an e-Retailer's IST sourcing strategies of make versus buy and partnership versus best-of-breed. The proposed models are tested using a panel data set of 307 e-Retail firms over the period of 2006 to 2010. The study opens up the black box of internal firm operations by introducing a granular view of IST sourcing decisions at both the value chain and e-Commerce architecture levels and examining the performance impacts of these strategic choices. This in-depth look at IST sourcing has yet to be explored in the literature.
ContributorsTsai, Juliana Yuh-Shun (Author) / Shao, Benjamin B. M. (Thesis advisor) / Goul, Michael (Committee member) / Santanam, Raghu T. (Committee member) / St. Louis, Robert D. (Committee member) / Arizona State University (Publisher)
Created2012
150987-Thumbnail Image.png
Description
In this dissertation, two interrelated problems of service-based systems (SBS) are addressed: protecting users' data confidentiality from service providers, and managing performance of multiple workflows in SBS. Current SBSs pose serious limitations to protecting users' data confidentiality. Since users' sensitive data is sent in unencrypted forms to remote machines owned

In this dissertation, two interrelated problems of service-based systems (SBS) are addressed: protecting users' data confidentiality from service providers, and managing performance of multiple workflows in SBS. Current SBSs pose serious limitations to protecting users' data confidentiality. Since users' sensitive data is sent in unencrypted forms to remote machines owned and operated by third-party service providers, there are risks of unauthorized use of the users' sensitive data by service providers. Although there are many techniques for protecting users' data from outside attackers, currently there is no effective way to protect users' sensitive data from service providers. In this dissertation, an approach is presented to protecting the confidentiality of users' data from service providers, and ensuring that service providers cannot collect users' confidential data while the data is processed or stored in cloud computing systems. The approach has four major features: (1) separation of software service providers and infrastructure service providers, (2) hiding the information of the owners of data, (3) data obfuscation, and (4) software module decomposition and distributed execution. Since the approach to protecting users' data confidentiality includes software module decomposition and distributed execution, it is very important to effectively allocate the resource of servers in SBS to each of the software module to manage the overall performance of workflows in SBS. An approach is presented to resource allocation for SBS to adaptively allocating the system resources of servers to their software modules in runtime in order to satisfy the performance requirements of multiple workflows in SBS. Experimental results show that the dynamic resource allocation approach can substantially increase the throughput of a SBS and the optimal resource allocation can be found in polynomial time
ContributorsAn, Ho Geun (Author) / Yau, Sik-Sang (Thesis advisor) / Huang, Dijiang (Committee member) / Ahn, Gail-Joon (Committee member) / Santanam, Raghu (Committee member) / Arizona State University (Publisher)
Created2012
151307-Thumbnail Image.png
Description
This study explores the impact of feedback and feedforward and personality on computer-mediated behavior change. The impact of the effects were studied using subjects who entered information relevant to their diet and exercise into an online tool. Subjects were divided into four experimental groups: those receiving only feedback, those receiving

This study explores the impact of feedback and feedforward and personality on computer-mediated behavior change. The impact of the effects were studied using subjects who entered information relevant to their diet and exercise into an online tool. Subjects were divided into four experimental groups: those receiving only feedback, those receiving only feedforward, those receiving both, and those receiving none. Results were analyzed using regression analysis. Results indicate that both feedforward and feedback impact behavior change and that individuals with individuals ranking low in conscientiousness experienced behavior change equivalent to that of individuals with high conscientiousness in the presence of feedforward and/or feedback.
ContributorsMcCreless, Tamuchin (Author) / St. Louis, Robert (Thesis advisor) / St. Louis, Robert D. (Committee member) / Goul, Kenneth M (Committee member) / Shao, Benjamin B (Committee member) / Arizona State University (Publisher)
Created2012