IS

Kumar, Ram L.

Topic Weight Topic Terms
0.537 software vendors vendor saas patch cloud release model vulnerabilities time patching overall quality delivery software-as-a-service
0.426 value business benefits technology based economic creation related intangible cocreation assessing financial improved key economics
0.368 source open software oss development developers projects developer proprietary community success openness impact paper project
0.330 security threat information users detection coping configuration avoidance response firm malicious attack intrusion appraisal countermeasures
0.210 project projects development management isd results process team developed managers teams software stakeholders successful complex
0.200 network networks social analysis ties structure p2p exchange externalities individual impact peer-to-peer structural growth centrality
0.192 options real investment option investments model valuation technology value analysis uncertainty portfolio models using context
0.191 managers managerial manager decisions study middle use important manager's appropriate importance context organizations indicate field
0.159 model research data results study using theoretical influence findings theory support implications test collected tested
0.155 values culture relationship paper proposes mixed responsiveness revealed specific considers deployment results fragmentation simultaneously challenges
0.152 technology investments investment information firm firms profitability value performance impact data higher evidence diversification industry
0.147 approach analysis application approaches new used paper methodology simulation traditional techniques systems process based using
0.147 insurance companies growth portfolios intensity company life portfolio industry newly vulnerable terms composition operating implemented
0.145 infrastructure information flexibility new paper technology building infrastructures flexible development human creating provide despite challenge
0.137 knowledge transfer management technology creation organizational process tacit research study organization processes work organizations implications
0.134 service services delivery quality providers technology information customer business provider asp e-service role variability science
0.121 information types different type sources analysis develop used behavior specific conditions consider improve using alternative
0.116 development systems methodology methodologies information framework approach approaches paper analysis use presented applied assumptions based
0.108 model models process analysis paper management support used environment decision provides based develop use using

Focal Researcher     Coauthors of Focal Researcher (1st degree)     Coauthors of Coauthors (2nd degree)

Note: click on a node to go to a researcher's profile page. Drag a node to reallocate. Number on the edge is the number of co-authorships.

Park, SungJune 2 Subramaniam, Chandrasekar 2 Temizkan, Orcun 2 Dong, Su 1
Johar, Monica S. 1
asset valuation 1 business value 1 business value of IT 1 benchmarking 1
economic analysis 1 economics of IS security 1 exploitation 1 information-system economics 1
information-technology investments 1 IT infrastructure 1 information systems security 1 IT asset valuation 1
IT services 1 knowledge management 1 knowledge-based services 1 OR models 1
open source software development 1 patch quality 1 patch release time 1 patch types 1
project success 1 real options. 1 service delivery 1 service science 1
software vendor types 1 software vulnerability characteristics 1 survival analysis 1 social networks 1
software development 1 team formation 1

Articles (6)

Exploitation and Exploration Networks in Open Source Software Development: An Artifact-Level Analysis (Journal of Management Information Systems, 2015)
Authors: Abstract:
    Open source software (OSS) development is an increasingly important paradigm of software development. However, key aspects of OSS such as the determinants of project success and motivations of developers in joining these projects are not well understood. Based on organizational theory, we propose that OSS activities of patch development and feature request can be classified as exploitation (implementation-oriented) and exploration (innovation-oriented) activities, respectively. We empirically examine how the structure of social network affects the success of patch-development and feature-request networks in OSS projects, using a data set collected from the SourceForge database. Our results provide empirical support for the view that patch development and feature request are exploitation and exploration activities, respectively. Network structures differ due to team formation differences and have a differential impact on development success based on the type of activity. The concepts of ambidextrous developers and ambidexterity are explored in the context of OSS projects. Collectively, our results indicate that studying OSS projects at the artifact level could improve our understanding of OSS project success and team formation. This, in turn, could lead to better management of OSS projects. > >
Patch Release Behaviors of Software Vendors in Response to Vulnerabilities: An Empirical Analysis. (Journal of Management Information Systems, 2012)
Authors: Abstract:
    Software vulnerabilities have become a serious concern because unpatched software runs the risk of being exploited by hackers. There is a need for software vendors to make software patches available in a timely manner for vulnerabilities in their products. We develop a survival analysis model of software vendors' patch release behavior and test it using a data set compiled from the National Vulnerability Database, United States Computer Emergency Readiness Team, and vendor Web sites. This model helps to understand how factors specific to vulnerabilities, patches, software vendors, and software affect the patch release behavior of software vendors based on their cost structure. This study also analyzes the impact of the presence of multiple vendors and type of vendor on the patch release behavior of software vendors. Our results indicate that vulnerabilities with high confidentiality impact or high integrity impact are patched faster than vulnerabilities with high availability impact. Interesting differences in the patch release behavior of software vendors based on software type (new release versus update) and type of vendor (open source versus proprietary) are found. Our results illustrate that when there are legislative pressures, vendors react faster in patching vulnerabilities. Thus, appropriate regulations can be an important policy tool to influence vendor behavior toward socially desirable security outcomes.
A Benchmarking Model for Management of Knowledge-Intensive Service Delivery Networks. (Journal of Management Information Systems, 2011)
Authors: Abstract:
    Effective management of information technology (IT) and IT-enabled services is becoming increasingly important due to the growing complexity of their context. These services are often delivered by employees who work at widely dispersed locations and interact with each other to constitute knowledge-intensive service delivery networks (KISDNs). This paper contributes to the effective design and management of KISDNs by presenting a mixed-integer programming model that integrates disparate streams of research. This model facilitates analysis and managerial benchmarking of KISDN performance. It captures how the performance of such networks depends on the interaction between workflow decisions, structure of information flow networks (IFNs), and knowledge management decisions. We propose that knowledge about IFNs and worker competence can be effectively used to make workflow decisions. Our results, based on the study of different IFN archetypes, illustrate practices for effective management of KISDNs. Managers can enhance business value by recognizing existing IFNs, increasing randomness in IFNs, nurturing weak or performative ties depending on the archetype, assigning tasks based on effective worker competence, and selectively delaying assignment of tasks to workers. In addition, our results illustrate the impact of training and network density on KISDN performance.
Understanding the Value of Countermeasure Portfolios in Information Systems Security. (Journal of Management Information Systems, 2008)
Authors: Abstract:
    Organizations are faced with a variety of information security threats and implement several information system security countermeasures (ISSCs) to mitigate possible damage due to security attacks. These security countermeasures vary in their ability to deal with different types of security attacks and, hence, are implemented as a portfolio of ISSCs. A key challenge for organizations is to understand the economic consequences of security attacks relative to the ISSC portfolio implemented. This paper combines the risk analysis and disaster recovery perspectives to build an integrated simulation model of ISSC portfolio value. The model incorporates the characteristics of an ISSC portfolio relative to the threat and business environments and includes the type of attack, frequency of attacks, possible damage, and the extent and time of recovery from damage. The simulation experiments provide interesting insights into the interactions between ISSC portfolio components and characteristics of business and threat environments in determining portfolio value.
A Framework for Assessing the Business Value of Information Technology Infrastructures. (Journal of Management Information Systems, 2004)
Authors: Abstract:
    Information technology (IT) infrastructure investments are an extremely important part of e-business and constitute a major portion of IT investments in many organizations. IT infrastructure investments include investments in connectivity, systems integration, and data storage that may be used by multiple applications. Prior research has recognized the importance of a flexible IT infrastructure as a source of competitive advantage. Evidence regarding the value of IT infrastructures is anecdotal, and there is a realization that large investments in IT infrastructures are often difficult to justify. This paper expands on the idea that the value of an IT infrastructure depends on its use in an organizational context, and presents a relatively simple approach to understanding and assessing the value of IT infrastructure investments. This approach is based on the asset valuation literature in finance. An example is provided to illustrate the proposed approach, and managerial implications are discussed.
A Note on Project Risk and Option Values of Investments in Information Technologies. (Journal of Management Information Systems, 1996)
Authors: Abstract:
    Justification of investments in information technologies is an important research topic in the information systems area. Several approaches have been proposed. One of these highlights the deficiencies of traditional economic justification based on net present value, and proposes the use of techniques based on financial option pricing theory. This paper examines the relationship between project risk and option values of investments in new information technologies and illustrates how this relationship is significantly different from well-known results in the case of financial option pricing. Conditions for determining the desirability of risky projects are derived.