Learn More
Firms invest in a variety of information technologies and seek to align their IT asset portfolios with two key performance outcomes: efficiency and innovation. Existing research makes the universalistic assumption that both outcomes will always be realized through firms’ IT asset portfolios. There has been limited research on the conditions under which(More)
E research considers the IT governance choice to be a trade-off between the cost-efficiency of centralization and the responsiveness provided by local information processing. This view predicts that firms tend to decentralize IT governance in more uncertain environments. We investigate this issue by studying the relationship between environmental(More)
The interdependency of information security risks often induces firms to invest inefficiently in information technology security management. Cyberinsurance has been proposed as a promising solution to help firms optimize security spending. However, cyberinsurance is ineffective in addressing the investment inefficiency caused by risk interdependency. In(More)
A novel compound classification algorithm is described that operates in binary molecular descriptor spaces and groups active compounds together in a computationally highly efficient manner. The method involves the transformation of continuous descriptor value ranges into a binary format, subsequent definition of simplified descriptor spaces, identification(More)
MPEG-7 (Multimedia Content Description Interface) is a standard for describing the content of multimedia data and adopts XML (eXtensible Markup Language) Schema as its Description Definition Language. However, as a forthcoming standard for querying XML data/documents, XQuery (XML Query Language) has weakness in the query of vector-based feature described in(More)
The interdependency of information security risks poses a significant challenge for firms to manage security. Firms may overor under-invest in security because security investments generate network externalities. In this paper, we explore how firms can use three risk management approaches, third-party cyberinsurance, managed security service (MSS) and risk(More)
Online targeting has been increasingly used to deliver ads to consumers. But discovering how to target the most valuable web visitors and generate a high response rate is still a challenge for advertising intermediaries and advertisers. The purpose of this study is to examine how behavioral targeting (BT) impacts users’ responses to online ads and(More)