Featured Article from Management Science
Cavagnaro, D., Gonzalez, R., Myung, J. I., Pitt, M. A. (2013). Optimal Decision Stimuli for Risky Choice Experiments. Management Science, 59(2), 358-375.
Abstract: Collecting data to discriminate between models of risky choice requires careful selection of decision stimuli. Models of decision making aim to predict decisions across a wide range of possible stimuli, but practical limitations force experimenters to select only a handful of them for actual testing. Some stimuli are more diagnostic between models than others, so the choice of stimuli is critical. This paper provides the theoretical background and a methodological framework for adaptive selection of optimal stimuli for discriminating among models of risky choice. The approach, called adaptive design optimization, adapts the stimulus in each experimental trial based on the results of the preceding trials. We demonstrate the validity of the approach with simulation studies aiming to discriminate expected utility, weighted expected utility, original prospect theory, and cumulative prospect theory models.
Articles in top-tier refereed academic journals
Alrushiedat, N., Olfman, L. (2013). Aiding Participation and Engagement in a Blended Learning Environment, Journal of Information Systems Education. 24(2), In Press.
Soper, D.S. (2012). "Is Human Mobility Tracking a Good Idea?", Communications of the ACM (CACM), 55(4), 35-37.
Soper, D. S., Turel, O. (2012). An n-Gram Analysis of Communications 2000–2010. Communications of the ACM, 55(5), 81-87.
Turel, O., Connelly, C. E., Fisk, G. M. (2013). Service with an e-smile: Employee authenticity and customer use of web-based support services. Information and Management, 50(2-3), 98-104.
Drezner, T., Drezner, Z., Kalczynski, P. (2012). Strategic competitive location: improving existing and establishing new facilities. Journal of the Operational Research Society, 63, 1720-1730.
Drezner, T., Drezner, Z., (2012). Modeling Lost Demand in Competitive Facility Location. Journal of the Operational Research Society, 63, 201-206.
Drezner, Z., Nickel, S., Ziegler, H. P. (2012). Stochastic Analysis of Ordered Median Problems. Journal of the Operational Research Society, 63, 1578-1588.
Kalczynski, P., Kamburowski, J. (2012). An empirical analysis of heuristics for solving the two-machine flow shop problem with job release times. Computers and Operations Research, 39, 2659–2665.
Kalczynski, P. (2012). A discrete model for optimal operation of fossil-fuel generators of electricity. European Journal of Operational Research, 216, 679–686.
Soper, D.S., Demirkan, H., Goul, M., and St. Louis, R. (2012). "An Empirical Examination of the Impact of ICT Investments on Future Levels of Institutionalized Democracy and Foreign Direct Investment in Emerging Societies". Journal of the Association for Information Systems (JAIS), 13(3), 116-149.
Turel, O., Serenko, A. (2012). The benefits and dangers of enjoyment with social networking websites. European Journal of Information Systems, 21(5), 512–528.
Xu, Z., Turel, O., Yuan, Y. (2012). Online game addiction among adolescents: motivation and prevention factors. European Journal of Information Systems, 21(3), 321–340.
Articles in refereed journlas
Alrushiedat, N. (2012). The role of experience in anchored asynchronous online discussions. European Journal of Business Research, 12(4), 5-12.
Bhaskar, R. (2012). How Information Technology Supports the Health Care. Journal of Cases on Information Technology, 14(2), i-iii.
Bhaskar, R., Vo, A. (2012). Health Care Reform Requires IT Solutions to Influence Consumer Perception at a Health Care Payer. Journal of Cases on Information Technology, 14(2), 18-26.
Vo, A., Bhaskar, R. (2012). Health Care Reform Requires Rethinking on the IT Strategy. Journal of Cases on Information Technology, 14(2), 65-72.
Bhaskar, R., Kapoor, B., Sherif, J. S. (2012). Managing homeland security: deployment, vigilance and persistence. Kybernetes: The International Journal of Systems & Cybernetics, 41(7/8), 1072- 1086.
Brimberg, J., Drezner, Z., Mladenovic, N., Salhi, S. (2012). Generating good starting solutions for the p-median problem in the plane. Electronic Notes in Discrete Mathematics, 39, 225-232.
Hamouda, E., Gouvy, N., Mitton, N., Simplot-Ryl, D. (2012). Minimizing energy consumption through mobility with connectivity preservation in sensor networks. International Journal of Parallel, Emergent and Distributed Systems, 27(6), 521-540.
Kalczynski, P.(2012). Empirical versus theoretical worst-case performance of flow shop heuristics. 18(2), 87-103.
Kapoor, B., Sherif, J. S., (2012). Human Resources in an enriched environment of business intelligence. Kybernetes: The International Journal of Systems & Cybernetics, 41(10), 1625-1637.
Bhaskar, R., Kapoor, B., Sherif, J. S., (2012). Impact of Managing homeland security: deployment, vigilance and persistence. Kybernetes: The International Journal of Systems & Cybernetics, 41(7/8), 1072- 1086.
Kapoor, B., Kleinbart, M. (2012). Building an Integrated Patient Information System for a Healthcare Network. Journal of Cases on Information Technology, 14(2), 27-41.
Kapoor, B., Sherif, J. S. (2012). Global Human Resources (HR) information systems. Kybernetes: The International Journal of Systems & Cybernetics, 41(Number 1/2 2012), 229-238.
Krishnamurthi, M., Chu, A. (2013). Analyzing Data in Social Networks- An Ethical Dilemma ?. Journal of International Management Studies, 13, 100-105.
Minh, D., Minh, D. D., Nguyen, A. L. (2012). Regenerative Markov Chain Monte Carlo for any distribution. Communications in Statistics, 41, 1745-1760.
Mitra, S. (2012). Gaussian Mixture Models for Human Face Recognition under Illumination Variations. Applied Mathematics, 3(12A), 2071-2079.
Mitra, S., Padman, R. (2012). Exploring Social Media for Health and Wellness: A Health Plan Case Study. Journal of Cases on Information Technology, 14(2), 42-64.
Lau, W. W., Pandya, P., Sherif, J. S. (2012). Dynamic Traffic Allocation Model of Voice over Internet Protocol Traffic and Public Switched Telephone Network. Kybernetes: The International Journal of Systems & Cybernetics, 41(3/4), 404.
Soper, D.S. and Demirkan, H. (2012). "How ICTs Affect Democracy and Corruption in Emerging Societies", IEEE IT Professional, 14(4), 18-23.
Diesner, J., Carley, K. M., Tambayong, L. (2012). Mapping Socio-Cultural Networks of Sudan from Open-Source, Large-Scale Text Data. Computational and Mathematical Organization Theory, 18(3), 328-339.
Tambayong, L., Carley, K. M. (2012). Network Text Analysis in Computer-Intensive Rapid Ethnography Retrieval: An Example from Political Networks of Sudan. Journal of Social Structure, 13(2),2.
Tarafdar, M., Gupta, A., Turel, O. (2013). The dark side of information technology use. Information Systems Journal, 23(3), 269-275.
Khanin, D., Turel, O., Mahto, R. (2012). How to Increase Job Satisfaction and Reduce Turnover Intentions in the Family Firm: The Family-Business Embeddedness Perspective. Family Business Review, 25(4), 391-408.
Turel, O., Connelly, C. E. (2012). Team Spirit: The Influence of Psychological Collectivism on the Usage of E-Collaboration Tools. Group Decision and Negotiation, 21(5), 703-725.
Khanin, D., Turel, O., (2012). Short-termism, long-termism, and regulatory focus in venture capitalists’ investment decisions. Venture Capital, 14(1), 61–76.
Yang, S. C. (2012). Mobile applications and 4G wireless networks: A framework for analysis. Campus-Wide Information Systems, 29(5), 344-357.
Yang, S. C. (2012). The Master's Program in Information Systems (IS): A Survey of Core Curriculums of U.S. Institutions. Journal of Education for Business, 87(4), 206-213.