Download Key Researchers - National Center for Border Security and

Document related concepts
no text concepts found
Transcript
A Summary of the Major Issues, Important Theories,
Top Papers, Key Researchers, and Future Research
Problems of Management Information Systems
By
Dongjoo Kang, Fang Chen, Haidong Bi, Inder Singh, James Hwang,
Jennifer Xu, Jing Zhang, Jinwei Cao, Jongseo Kim, Kathy Broneck,
Matt Hacking, Ming Lin, Theo Song, Wei Gao, Wingyan Chung,
Yunchu Huang, and Zan Huang
For
Dr. Nunamaker’s MIS 696A Course
Fall Semester 2000
Table of Contents:
MIS Model .......................................................................................................................... 1
Artificial Intelligence .......................................................................................................... 2
Important Theories and Trends ....................................................................................... 2
Future Research .............................................................................................................. 2
Key People ...................................................................................................................... 3
Herbert A. Simon ........................................................................................................ 3
John McCarthy ............................................................................................................ 3
Raj Reddy.................................................................................................................... 3
Edward A. Feigenbaum .............................................................................................. 4
Roger C. Schank ......................................................................................................... 4
Hsinchun Chen ............................................................................................................ 4
Key Papers ...................................................................................................................... 4
CMC/HCI/Communication/Visualization .......................................................................... 6
Introduction ..................................................................................................................... 6
Most Important Theories................................................................................................. 6
Key Issues, Conflicts, And Major Research Problems ................................................... 6
Key Researchers.............................................................................................................. 6
Frank Biocca ............................................................................................................... 6
Robert Kraut................................................................................................................ 6
Jakob Nielsen .............................................................................................................. 7
Judy Olson .................................................................................................................. 7
Ben Shneiderman ........................................................................................................ 7
Sherry Turkle .............................................................................................................. 8
Joseph Walther ............................................................................................................ 8
Suzie Weisband........................................................................................................... 8
Key Papers ...................................................................................................................... 8
Computing Policy ............................................................................................................. 11
Introduction ................................................................................................................... 11
Most Important Theories............................................................................................... 11
Key Issues, Conflicts, and Major Research Problems .................................................. 11
Key Researchers............................................................................................................ 13
Barbara Simons ......................................................................................................... 13
Peter G. Neumann ..................................................................................................... 13
Seymour E. Goodman ............................................................................................... 13
Eli M. Noam.............................................................................................................. 14
Robert Kling.............................................................................................................. 14
Peter J. Denning ........................................................................................................ 15
Dorothy E. Denning .................................................................................................. 15
Pamela Samuelson .................................................................................................... 15
Sharon Eisner Gillett ................................................................................................. 16
Key Papers .................................................................................................................... 16
Database ............................................................................................................................ 18
Introduction ................................................................................................................... 18
Key Theories ................................................................................................................. 18
i
Key Issues ..................................................................................................................... 18
Future Research ............................................................................................................ 18
Key Researchers............................................................................................................ 19
Peter P. Chen ............................................................................................................. 19
Edgar F. Codd ........................................................................................................... 19
Won Kim................................................................................................................... 19
Stuart E. Madnick ..................................................................................................... 19
Salvatore T. March.................................................................................................... 20
Sudha Ram ................................................................................................................ 20
Joseph S. Valacich .................................................................................................... 21
Key Papers .................................................................................................................... 21
E-Commerce ..................................................................................................................... 23
Introduction ................................................................................................................... 23
Key Issues, Conflicts, and Major Research Problems .................................................. 23
Key Researchers............................................................................................................ 24
Lynda M Applegate .................................................................................................. 24
Andrew B. Whinston ................................................................................................ 24
Vladimir Zwass ......................................................................................................... 24
Yannis Bakos ............................................................................................................ 25
Haim Mendelson ....................................................................................................... 25
Key papers .................................................................................................................... 25
Group Support System (GSS) ........................................................................................... 27
Introduction and Key Theories ..................................................................................... 27
Key Issues and Conflicts ............................................................................................... 27
Major Research Problems in the Future........................................................................ 27
Key Researchers............................................................................................................ 28
Jerry DeSanctis ......................................................................................................... 28
R. Brent Gallupe ....................................................................................................... 28
Sara Kiesler ............................................................................................................... 28
Jay F. Nunamaker, Jr. ............................................................................................... 29
Wanda J. Orlikowski................................................................................................. 29
Judy Olson ................................................................................................................ 29
Sirkaa L. Jarvenpaa ................................................................................................... 30
Douglas R. Vogel ...................................................................................................... 30
Key Papers .................................................................................................................... 30
Information Economics ..................................................................................................... 33
Key Issues and Conflicts ............................................................................................... 33
Most Important Theories............................................................................................... 33
Key Researchers............................................................................................................ 34
Erik Brynjolfsson ...................................................................................................... 34
Charles H. Kriebel .................................................................................................... 34
Tridas Mukhopadhyay .............................................................................................. 34
Andrew B. Whinston ................................................................................................ 34
Key papers .................................................................................................................... 34
Information Retrieval ........................................................................................................ 38
Key Issues ..................................................................................................................... 38
ii
Trends ........................................................................................................................... 38
Key People .................................................................................................................... 38
Gerard Salton ............................................................................................................ 38
Karen Sparck Jones ................................................................................................... 38
Gary Marchionini ...................................................................................................... 39
Edward A. Fox .......................................................................................................... 39
W. Bruce Croft .......................................................................................................... 39
Key Papers .................................................................................................................... 39
Knowledge Management .................................................................................................. 41
Introduction ................................................................................................................... 41
Categories of Knowledge Management Research ........................................................ 41
Key Theories and Methodologies ................................................................................. 42
Key Issues ..................................................................................................................... 42
Future Research Trends ................................................................................................ 42
Key Researchers............................................................................................................ 42
Christine L. Borgman................................................................................................ 42
Hsinchun Chen .......................................................................................................... 42
W. Bruce Croft .......................................................................................................... 43
Daniel E. O'Leary ..................................................................................................... 43
Gerard Salton ............................................................................................................ 43
Key Articles .................................................................................................................. 43
Operation Research ........................................................................................................... 46
Introduction ................................................................................................................... 46
Key People .................................................................................................................... 46
Hau L. Lee ................................................................................................................ 46
Marshall Fisher ......................................................................................................... 46
James B. Orlin ........................................................................................................... 47
George Nemhauser.................................................................................................... 47
Ellis Johnson ............................................................................................................. 47
Moshe Dror ............................................................................................................... 47
Key Papers .................................................................................................................... 47
Social/Ethical/Psychological Issues .................................................................................. 50
Introduction ................................................................................................................... 50
Most Important Theories............................................................................................... 50
Key Issues, Conflicts, and Major Research Problems .................................................. 50
Key Researchers............................................................................................................ 51
Mary J. Culnan .......................................................................................................... 51
Sara Kiesler ............................................................................................................... 51
Robert Kling.............................................................................................................. 51
Donald Norman ......................................................................................................... 51
Gary Olson ................................................................................................................ 52
Lee Sproull ................................................................................................................ 52
Key Papers .................................................................................................................... 52
Supply Chain Management ............................................................................................... 55
Most Important Theories............................................................................................... 55
Key Issues and Conflicts ............................................................................................... 55
iii
Key researchers ............................................................................................................. 56
Gerard P. Cachon ...................................................................................................... 56
Fangruo Chen ............................................................................................................ 56
Hau L. Lee ................................................................................................................ 56
Paul H. Zipkin ........................................................................................................... 56
Key papers .................................................................................................................... 56
Systems Analysis and Design ........................................................................................... 59
Key Issues ..................................................................................................................... 59
Key Researchers............................................................................................................ 59
Tom DeMarco ........................................................................................................... 59
Grady Booch ............................................................................................................. 59
Michael Fagan ........................................................................................................... 60
Roger S. Pressman .................................................................................................... 60
Watts S. Humphrey ................................................................................................... 60
Edward Yourdon ....................................................................................................... 61
Key Papers/Books ......................................................................................................... 61
Telecommunication........................................................................................................... 63
Key Theories and Issues ............................................................................................... 63
Future Work .................................................................................................................. 63
Key Researchers............................................................................................................ 63
Robert E. Kahn.......................................................................................................... 63
Ted Nelson ................................................................................................................ 64
David Clark ............................................................................................................... 64
Deborah Estrin .......................................................................................................... 65
Roch Guerin .............................................................................................................. 65
Key Articles .................................................................................................................. 65
Workflow .......................................................................................................................... 68
Introduction ................................................................................................................... 68
The Evolution of Workflow .......................................................................................... 68
Trends ........................................................................................................................... 68
Key People .................................................................................................................... 69
Christoph Bussler ...................................................................................................... 69
Clarence Ellis ............................................................................................................ 69
Stefan Jablonski ........................................................................................................ 69
Amit P. Sheth ............................................................................................................ 69
J. Leon Zhao.............................................................................................................. 69
Key Papers .................................................................................................................... 70
Appendix A ....................................................................................................................... 72
iv
MIS Model
Management Information Systems is one of the most dynamic fields of study in
academia. In comparison to other fields of study, it is a young, applied research
discipline. However, what exactly is MIS? Elements of MIS may include computerbased systems, networks, people, processes, data, and software. This paper proposes that
MIS is a new and previously unknown junction of reference disciplines. Many reference
disciplines tend to conduct more basic research while MIS performs more applied
research. The reference disciplines for MIS include Electrical and Computer
Engineering, Computer Science, Management and Organizational Behavior, Systems and
Industrial Engineering, Cognitive Psychology, and Economics.
How does MIS relate to reference disciplines? Some reference disciplines, such as
accounting, management, and economics, are related to business and compete more
directly with MIS for resources and credibility. However, MIS does something no
reference discipline does, or it wouldn't exist at all! As will be shown by the following
review of major issues, important theories, top papers, key researchers, and future MIS
research areas, MIS integrates many disciplines.
MIS
CS
KM
AI
IR
DB
Telecom
EC
EE
ORG
GSS
SS
WF
CMC/HCI/VIS
Soc/Eth/Psy
Policy
Info Econ
ECON
OR
MS
Overview of MIS
Artificial Intelligence
Important Theories and Trends
The original goal of AI (Artificial Intelligence) is to understanding and implementing
intelligence. Herbert A. Simon further paints a broad picture of AI as a discipline
constantly pursuing computational creations that challenge the uniqueness of biologically
grounded intelligence. John McCarthy gives 12 branches of AI, namely, logic, learning,
searching, representation, pattern recognition, inference, common sense knowledge,
planning, epistemology, ontology, heuristics, and genetic programming.
The controversies of AI fall into the following three major categories:
(1) Knowledge representation and reasoning:
A longstanding view of the role of logic in AI is that logic is an abstracted, hence simpler
form of natural language. Thus it provides an ideal medium for a first approximation.
This view is attacked with a variety of arguments [Wolfgang Bibel].
Drew McDermott argues that AI’s success arises not from sophisticated representation
and reasoning methods, but rather from simple representations and tractable algorithms.
Another controversy concerning knowledge representation and reasoning is whether
intelligence is derived primarily from logical reasoning or from knowledge. The
controversy is not about whether common sense is necessary but how much it should be
built into the logic or into the knowledge base [Bruce Buchanan].
(2) Machine learning:
The problem is whether computers should attempt to model how people or whether
computers should follow methods did that no person things that no person could ever do
and that might actually improve on people. [Roger Schank]. Oliver Selfridge suggests
that AI software should be more concerned with being changeable than with satisfying
specifications.
(3) The practice of AI:
There is a conflict between methodology-driven and phenomenon-driven research in AI,
as well as the conflict between quantitatively valuable research and the more creative and
often less quantifiable research necessary for a constantly growing discipline [Jerry
Feldman].
Future Research
(1) The decline in complex knowledge representations and the success of prepositional or
probabilistic competitors [Drew McDermott];
(2) Machine learning and automation of deductive reasoning [Donld Michie].
2
(3) Building intelligent systems that will let people access and utilize enormous amounts
of information generated by modern societies in various forms for making informed
decisions [Ryszard Michalski].
(4) Multi-Agent Systems, application for data mining, knowledge Management.
Key People
Herbert A. Simon
Description
Professor, Carnegie-Mellon University, Pittsburgh, PA
Alfred Nobel Memorial Prize in Economic Sciences in 1978 for
"pioneering research into the decision-making process within economic
organizations”
ACM: AM Turing Award, 1975
Research interests
Building and testing theories of human cognition, using computer
simulation models. The usage of different representations to draw
inferences from information, especially reasoning from
diagrammatically and pictorially presented information, and comparing
the effectiveness for communication purposes of different
representations.
John McCarthy
Description
Professor of Computer Science at Stanford University
The inventor of LISP. ACM/A.M. Turing Award, 1971.
Research Interests
His research is mainly in artificial intelligence. Long ago he originated
the Lisp programming language and the initial research on general
purpose time-sharing computer systems
Raj Reddy
Description
Herbert A. Simon University Professor, Computer Science and
Robotics in the School of Computer Science at CMU.
He served as the founding Director of the Robotics Institute from 1979
to 1991. He served as the Dean of School of Computer Science at CMU
from 1991 to 1999. He was awarded the ACM Turing Award in 1994
Research Interests
Dr. Reddy's research interests include the study of human-computer
interaction and artificial intelligence. His current research projects
include spoken language systems; invisible computing, gigabit
networks; universal digital libraries; and distance learning on demand
3
Edward A. Feigenbaum
Description
Professor of Computer Science and Co-Scientific Director of the
Knowledge Systems Laboratory at Stanford University.
Dr. Feigenbaum served as Chief Scientist of the United States Air
Force from 1994 to 1997. He was a recipient of the 1994 ACM Turing
Award.
Research Interests
Knowledge-Based Systems Research and Applications; Computer
Industry Research; Defense Technology and Technology Policy
Roger C. Schank
Description
Roger C. Schank, director of the Institute for the Learning Sciences (ILS)
at Northwestern University, is a leader in the field of artificial
intelligence and multimedia-based interactive training.
Research Interests
His work stresses the value of learning from experts, developing skills
rather than perfecting routines, and applying the benefits of "just-in-time"
training
Hsinchun Chen
Background
Professor, MIS Department. University of Arizona
He received the Ph.D. degree in Information Systems from New York
University in 1989. He is author of more than 70 articles covering semantic
retrieval, search algorithms, knowledge discovery, and collaborative
computing in leading information technology publications.
Research Interests
Digital Libraries, Knowledge Management, Multi-lingual and Distributed Information
Retrieval
Key Papers
Computer Machinery and Intelligence, A. M. Turing
This paper address the question of “Can machine think?” Turing takes a behavioristic
posture relative to the question. The question is to be decided by an unprejudiced
comparison of the alleged “thinking behavior” of the machine with normal “think
behavior” of human beings. hw propose an experiment-commonly called “Turing test”-in
which the unprejudiced comparison could be made. Though the test has flaws, it is the
best that has been proposed to date.
Understanding The Natural and the Artificial Worlds, Herbert A. Simon. The Science of
Artificial Intelligence, 1996, pp 1-24.
Understanding the natural and the artificial worlds, The psychology of thinking:
embedding artifice in nature, The science of design: creating the artificial, The
4
architecture of complexity. "Artificial" denotes systems that have a given form and
behavior because they adapt to their environment in reference to goals or purposes.
Some Philosophical Problems from the Standpoint of Artificial Intelligence, John
McCarthy and Pat Hayes, 1969 in Machine Intelligence 4.
It is the basic paper on situation calculus. This paper looks at some philosophical issues
concerning artificial intelligence, which includes how the concept of ability and belief
could be given formal definition in the metaphysically adequate automaton model and
indicates the correspondence between these formal concepts and the corresponding
commonsense concepts, construction of epistemologically adequate system. Instead of
given formal definitions, formal notions are introduced by informal natural language
descriptions with examples of their use to describe situations and possibilities for action
they present.
Intelligence without Robots, oren Etzioni, AI Magazine, Winter 1993, vol. 14, no. 4, pp.713.
In his recent papers, entitled "Intelligence without Representation and "Intelligence
without Reason," Brooks argues for studying complete agents in real-world environments
and for mobile robots as the foundation for AI research. This article argues that, even if
we seek to investigate complete agents in real-world environments, robotics is neither
necessary nor sufficient as a basis for AI research. The article proposes real-world
software environments, such as operating systems or databases, as a complementary
substrate for intelligent-agents research, and considers the relative advantages of software
environments as test beds for AI.
Natural Language Processing, Roger C. Schank, Eugene Charniak, Yorick Wilks, Terry
Winograd, William A. Woods: IJCAI 1977: 1007-1013
5
CMC/HCI/Communication/Visualization
Introduction
Computer-mediated-communication (CMC), human-computer-interaction (HCI),
communication and visualization of design interface impacts the research within MIS.
This body of literature’s research tries to understand how humans interact and
communicate with one another using different computerized technologies. It is important
to understand how people interact with the computer and with one another in order to
better understand prototypes that MIS researchers may design. The communication
amongst these modes needs to also be taken into consideration as research has suggested
that decisions, communication, and usage of technologies differ via computers than in
face-to-face (FTF) settings.
Most Important Theories
Some important theories, hypothesis, and models to come from this area of research are
Interactivity Model, The Postrepresentational Model (HCS), Artificial Morality, SIDE
Theory.
Key Issues, Conflicts, And Major Research Problems
The current key issues in this area are the visualization of dynamic processes in network
and the interaction metaphor for dynamic processes. It consists of the integration of
tactile sensing, vision, and sound.
Key Researchers
Frank Biocca
Contact Information
404 Communication Arts and Sciences
Michigan State University
Department of Communications
East Lansing, MI
(517) 355-5073; e-mail: [email protected]
Research areas
Dr. Biocca studies computer design and visualizations. He is a leader in research
surrounding multi-modal sensory information. The focus of his research is being able to
understand if when interfaces become more anthropomorphic and/or interactive if users
engage in higher levels of consciousness.
Robert Kraut
Contact Information
3515 Newell-Simon Hall
Carnegie Mellon University
6
5000 Forbes Avenue
Pittsburgh, PA 15213-3891
(412) 268-7694; e-mail: [email protected]
Research areas
Dr. Kraut studies emerging information technologies and how they in turn affect human
communication. Specifically, he focuses on individuals and organizations performance
in coordinating tasks, prototyping designs, Video communication systems, and
technology on quality of work. Currently, Dr. Kraut is working on the influence of
networks and communication technology. He is also involved in the HomeNet project.
Jakob Nielsen
Contact Information
2704 Fairbrook Dr.
Mountain View, CA 94040
E-mail: [email protected]
Research areas
Currently he is working on the designs of websites and information architecture and task
design. He has published in the ACM, serves on journal editorial boards, and was listed
as one of the web’s most influential people.
Judy Olson
Contact Information
University of Michigan
701 Tappan Street
C-2420 Bus. Ad.
Ann Arbor, MI. 48109-1234
(734) 647-4606; e-mail: [email protected]
Research areas
Her focus is on Human-computer-interaction and the design and evaluation issues of
software. She has worked for Bell laboratories and is currently a Professor in the School
of Information. Her achievements include over 50 books and articles involving human
psychology, computers, and visualization design.
Ben Shneiderman
Contact information
Department of Computer Science
University of Maryland
College Park, MD 20742
(301) 405-2680; e-mail: [email protected]
Research areas
Dr. Shneiderman’s research pertains to areas involving human-computer-interaction and
psychology. He also participates in visualization information representation and design.
His achievements include being a Fellow of the ACM, the founding director of Human
Computer Interaction Laboratory, and hosting an annual satellite presentation of User
Interface Strategies.
7
Sherry Turkle
Contact Information
Program in Science, Technology, and Society, MIT
E51-296c
77 Massachusetts Ave.
Cambridge, MA 02139-4307
(617) 253-4068; e-mail [email protected]
Research areas
Dr. Turkle has been researching communication on the Internet along with psychological
impacts of computational objects. Her interests have involved computer culture,
sociology, and psychology with regards to new technologies, specifically the Internet.
Her research has been funded by organizations such as the NFS, Guggenheim
Foundation, and the Rockefeller Foundation.
Joseph Walther
Contact Information
Dept. of Language, Literature, and Communication
Rensselaer Polytechnic Institute
110 8th Street
Troy, NY 12180-3590
(518) 276-2557; e-mail: [email protected]
Research areas
His research focuses on computer-mediated-communication and its effects in teaching,
teams and social relationships. He draws in psychological and social issues of Internetbased communication into collaborative work across countries. Dr. Walther has won
awards in NCA for his works on technological communities and interpersonal
communication.
Suzie Weisband
Contact Information
Department of Management Information Systems
Eller College of Business and Public Administration
The University of Arizona
Tucson, Arizona 85721
(520) 621-8303; E-mail: [email protected]
Research areas
Dr. Weisband’s research includes social and behavioral impacts of technology on people.
She has participated in research involving communication among groups using various
technological platforms and interactivity. Dr. Weisband has also been involved in GSS
research, F-t-F interactions, and melding disciplines such as MIS, Communication,
Sociology, and Psychology into her research.
Key Papers
8
Biocca, F., Kim, T., and Levy, M. R. (1995). Chapter 1: The vision of virtual reality. In
F. Biocca’s Communication in the age of virtual reality (pp. 3-14). Hillsdale, NJ:
Erlbaum.
The chapter looks at if virtual reality would make for a better medium of communication.
They suggest that VR is the ultimate form of media technology. If this is the case, MIS
researchers need to look at different areas of design integrating VR.
Daft, R. L. and Lengel, R. H. (1986). Organizational information requirements, media
richness and structural design. Management Science, 32(5), 554-571.
The article primarily discusses that uncertainty and equivocality are the primary factors
why organization processes information. It attempted to integrate equivocality with
uncertainty and argue that structural characteristics are used to help organization to cope
with these two factors. The authors proposes models that show how organization can be
design to meet the information needs of technology, interdepartment relations, and the
environment.
Galagher and Kraut. (1994). Computer mediated communication for intellectual
teamwork. Information Systems Research, 5(2), 110-138.
This article analyzes contingency theory’s prediction that using computer mediated
communication to accomplish complex collaboration work will be difficult, especially for
tasks that require interactive, expressive communication. The author conducted
experiments with sixty-seven three person groups of students that completed two
collaborative writing projects under either computer only, computer plus phone or face to
face communications. The findings tend to confirm the contingency hypothesis regarding
the difficulty of accomplishing work that involves ambiguous goals, multiple
perspectives, and information that is susceptible to multiple interpretations without an
interactive multiperson communication medium, such as face-to-face meetings.
Kramer, R. and Tyler, T. (1996). Trust in organizations: Frontiers of theories and
research. Sage Publications
Laudauer, T. K. (1995). The troubles with computers: Usefulness, usability, and
productivity. MIT Press, Cambridge, MA.
The book explains and illustrates why computers are in trouble and why investments on
computing have not resulted in productivity. The author argues that the conditions are the
result of the fact that computers rarely improve efficiency of the information work
because they are too hard to use and do too little that is sufficiently useful. The author
proposed that the use of user centered development technique through task analysis,
iterative design, trial use, and evaluation, computer systems can be powerful tools.
Reeves and Nass. (1996). The media equation : How people treat computers, television,
and new media like real people and places. Cambridge University Press, Cambridge, UK.
The book involves numerous studies conducted by Reeves and Nass to understand how
people treat media such as computers, television, and other new technologies. They found
that people tend to have biases and opinions about the medium they are interacting with.
Changes in voice or display can result in the changes of attitudes towards the mechanism
9
they are interacting with. While there has been much academic discussion as to whether
or not the results found in the book are correct, it poses an area of research that had not
been looked at before that MIS researchers should be aware of. If there is truth to the
findings of people, then how MIS designs systems needs to be wary of the findings. If
people respond in different ways to small characteristics such as male versus female
voice and credibility attributions of interactions that ensue, then small design issues of
choosing voice automated systems can impact user satisfaction.
Sproull, L. and Kiesler, S. (1991). Connections: New waysof working in the networked
organization. MIT Press, Cambridge, MA.
Within the book, the authors demonstrate the effect of new technologies in organizational
communication and how people's thinking and working habits change in lieu of these
technologies. They give guideline criteria as to how people utilize technology, such as email, to form better networks and how visions and goals of the organization should in
turn be shaped. The book gives a good basis for understanding users within an
organization, what impact inventions can have on a user, and the different characteristics
of how people use the technology. Since MIS involves organizations and communicative
functions within, understanding how their prototypes and designs effect an organization
and its people is beneficial. When designing prototypes, audience characteristics need to
be taken into consideration.
Walther, J. (1995). Relational aspects of CMC: Experimental observations over time.
Organization Science, 6( 2), 186-203.
This article looked at computer conferencing and its effects on people's perceptions of the
relational messages found within. Dr. Walther suggests that past research about CMC
relational research is inconsistent and that some areas of interpersonal communication are
actually better when done over CMC than in face-to-face groups. It is important for MIS
researchers to understand when it is better to engage in group work over CMC versus
face-to-face to achieve better results in their proposed designs for task related situations.
10
Computing Policy
Introduction
The discipline is not well established till present. Papers in this field can be found in
many journals such as Communication of the ACM, Computers andSociety, Science,
Technology and Human Values, and etc. But there is no key journal for this filed, which
is also true for debate about the social roles of information technology as mentioned in
Rob Kling’s book, Computerization and Controversy: Value Conflicts and Social
Choices.
The discipline is closely related to research in social and ethics issues of computing,
which is come from the close relationship between social science, ethics and policy
science. Rob Kling divided theoretical perspectives adopted by Social Analysts of
Computing into two major categories, and Policy research was included into this scheme.
Social Analysis of Computing
Systems Rationalism
Rational
Structural
Human Relations
Segmented Institutionalism Interactionist
Organizational Politics
Class Politics
The suitable definition for “policy” from Webster for this domain is “a high-level overall
plan embracing the general goals and acceptable procedures especially of a governmental
body ”. Policy issues research is different from social and ethics issues research. Social
and ethics research focus on the roles of information technology in social or ethical
settings, and policy research focuses on the high-level relationship between different
participants/actors in the social environment, and power and goal are the key issues.
Government is usually involved in research of this discipline, and because of the
difference between different countries on social organization and government roles,
international view should be taken to describe the who picture.
Most Important Theories
Theories in this field is from economics, policy and technology, and it is hard to address
key theories for this not well defined field.
Key Issues, Conflicts, and Major Research Problems
Universal Access
Intellectual Property
Encryption and Computer Security
Free Speech and the Internet
Funding for Scientific Research
11
Privacy
Electronic Commerce: Taxation, Supply chain/Industrial structure
Policy aspects (WTO, International Telecommunication Union, Federal Communications
Commission, Harmonization)
Regulatory Frameworks
General Political Milieu
The role of the state/government
From TIPI(Telecommunications and Information Policy Institute, University of Texas,
Austin TX 78712, USA)
Emerging Issues in the International Telecommunications and Information Environment:
Research Topics
1. TELECOMMUNICATIONS *
A. Policy Aspects *
World Trade Organization *
International Telecommunication Union *
Federal Communications Commission *
Special focus: Harmonization *
B. Access and Equity *
Universal Access *
Digital Divide *
C. Subsidies *
D. Regulatory Frameworks *
E. General Political Milieu *
F. The role of the state/government *
G. Structure *
H. Rates *
I. Procurement *
J. Technologies *
Convergence *
Innovation *
K. Services *
2. INNOVATION CLUSTERS/TECHNOPOLES *
A. Space and Place *
B. Agglomeration *
Institutional Frameworks *
Other importance factors include: *
Cultural Conditions *
Demand *
"Environmental" Conditions *
Labor *
C. Agglomeration is not a sufficient condition *
D. Software Development *
3. ELECTRONIC COMMERCE *
A. Space/Place *
12
B. Taxation *
C. Supply chain/ Industrial structure *
D. Technological Bases *
Transaction Security *
Privacy *
E. Intellectual Property *
Key Researchers
Barbara Simons
[email protected] , http://barbara.simons.org
Dr. Simons was elected President of ACM in 1998, the same year in which she
also won the Electronic Frontier Foundation Pioneer Award. Selected by c-net in
1995 as one of its 26 Internet "Visionaries," and named one of the "Top 100
Women in Computing" by Open Computing in 1994, she holds several patents
and has authored numerous technical papers. Dr. Simons is a member of the President's
Export Council's Subcommittee on Encryption and is also a Fellow of ACM and the
American Association for the Advancement of Science.
Education
Ph.D. in computer science from the University of California, Berkeley, in June 1981 thesis advisor Richard Karp. My dissertation, Scheduling with Release Times and
Deadlines, solved a major open problem in scheduling by developing the first known
algorithm for the problem.
Research areas
Policy Issues, Scheduling Theory, Compiler Optimization, Fault Tolerant Distributed
Computing, Communicating Sequential Processes
Peter G. Neumann
Principal Scientist at SRI International Computer Science Laboratory
http://www.csl.sri.com/neumann/neumann.html
[email protected]
Education
He spent eight years at Harvard (1950-58, with his A.B. in Math in 1954, S.M. in Applied
Math in 1955, and PhD in 1961 after returning from his two-year Fulbright in Germany
(1958-60), where he received the German Dr rerum naturarum in 1960.
Research areas
His main research interests continue to involve security, crypto applications, overall
system survivability, reliability, fault tolerance, safety, software-engineering
methodology, systems in the large, applications of formal methods, and risk avoidance.
Seymour E. Goodman
[email protected]
Seymour (Sy) E. Goodman has been Professor of MIS (1981) and a member of
the Center for Middle Eastern Studies at the University of Arizona, and
Carnegie Science Fellow (1994) and head of the Program on the Information
Technologies and International Security at the Center for International Security
13
and Arms Control, Stanford University. Earlier tenured and visiting appointments have
been at the University of Virginia (Applied Mathematics and Computer Science),
Princeton University (Mathematics and the Woodrow Wilson School of Public and
International Affairs), and the University of Chicago (Economics).
Education
He did his undergraduate work at Columbia University, and obtained his Ph.D. from the
California Institute of Technology.
Research Areas
Prof. Goodman's research interests include international developments in the information
technologies (IT), technology diffusion, IT and national security, and related public
policy issues. Areas of geographic interest include the former Soviet Union and Eastern
Europe, Latin America, the Middle East, Southeast Asia, and parts of Africa. Earlier
research had been in areas of statistical and continuum physics and combinatorial
algorithms.
Eli M. Noam
[email protected]
http://www.citi.columbia.edu/elinoam
Director, Columbia University Institute for Tele-Information; 1983-1987, 1991present
Professor of Finance and Economics, Columbia Business School; 1976-present
Education
Harvard: A.B. 1970 (Phi Beta Kappa); A.M. 1972; J.D. 1975; Ph.D. Economics, 1975,
Dissertation adviser: Martin Feldstein.
Research Areas
Communications, information, public choice, public finance, and general regulation.
Robert Kling
[email protected]
http://www.slis.indiana.edu/kling/
In August 1996, he moved to Indiana University - Bloomington as Professor of
Information Science and Information Systems. He directs a new
interdisciplinary research center at IU, the Center for Social Informatics and
also directs the Master of Information Science degree program.
Between 1966 and 1971 he held a research appointment in the Artificial Intelligence
Center at the Stanford Research Institute. He held his first professorship in Computer
Science at the University of Wisconsin-Madison between 1970-1973. He was on the
faculty of UC-Irvine from 1973-1996 and held professorial appointments at UCI's Center
for Research on Information Technology and Organizations and Graduate School of
Management.
Education
He completed his undergraduate studies at Columbia University (1965) and his graduate
studies, specializing in Artificial Intelligence, at Stanford University (1967, 1971).
Research Areas
Social Informatics; Organizational Informatics; Information Systems; Information
Technology and Social Change
14
His research focuses upon the social consequences of computerization and the social
choices that are available to people. He has studied these issues in and around
organizations that have invested in various information systems, desktop computing,
computerized manufacturing environments, digital libraries, instructional computing, etc.
He believes that we have to understand information technologies in terms of their
associated social structures and politics, and in meaningful social contexts -- not just as
"information tools."
Peter J. Denning
[email protected]
http://www.cs.gmu.edu/faculty/denning/
Peter J. Denning is Professor of Computer Science and University Coordinator
for Process Reengineering at George Mason University. Since joining GMU in
1991, he served as vice provost for continuing professional education, associate
dean for computing, and chair of the Computer Science Department in the School
of Information Technology and Engineering. He is founding director emeritus of
the Hyperlearning Center, formerly the Center for the New Engineer, which he founded
in 1993.
Research Areas
Operating Systems, Workflow Management, High Performance Computing, Security,
Performance Modeling
Dorothy E. Denning
[email protected].
http://www.cs.georgetown.edu/~denning/
Dorothy E. Denning is professor of Computer Science at Georgetown University
and director of the Georgetown Institute for Information Assurance. She is also
affiliated with the Communication, Culture and Technology program and the
Science and Technology in International Affairs program. Her area of specialty is
information warfare and information assurance.
Research Areas
Information warfare and information assurance
Education
B.A. and M.A. degrees in mathematics from the University of Michigan, Ph.D. degree in
computer science from Purdue University
Pamela Samuelson
[email protected]
http://www.sims.berkeley.edu/~pam/
Pamela Samuelson is a Professor at the University of California at Berkeley with a
joint appointment in the School of Information Management and Systems and the School
of Law. She is also Co-Director of the Berkeley Center for Law and Technology.
Research Areas
Intellectual Property Law, Copyright Law
15
Education
Yale Law School: J. D. 1976, University of Hawaii at Honolulu: M. A. 1972, Political
Science, B. A. 1971, History
Sharon Eisner Gillett
Sharon Eisner Gillett is the Executive Director of the MIT Internet and Telecoms
Convergence Consortium and a Research Associate at the MIT Center for
Technology, Policy, and Industrial Development. Ms. Gillett is the author of
numerous articles about the Internet and telecommunications, including,
"Connecting Homes to The Internet: An Engineering Cost Model of Cable vs. ISDN,"
and "The Self-Governing Internet: Coordination by Design" (with Mitchell Kapor). From
1982-92 she worked as a software engineer and manager at BBN Communications Corp.
and Thinking Machines Corp.
Research
Telecommunication Policy
Education
Ms Gillett received her MBA and MS in Technology and Policy from MIT in 1995, and
her AB in Physics from Harvard-Radcliffe in 1982.
Key Papers
Social Analyses Of Computing - Theoretical Perspectives In Recent Empirical-Research
Kling R. Computing Surveys. 12: (1) 61-110 1980, 172.
The Global Diffusion Of The Internet - Patterns And Problems
Goodman Se, Press Li, Ruth Sr, Rutkowski Am Communications Of The ACM
37: (8) 27-31 Aug 1994 14
This paper concerns about the international diffusion of the internet technology. Several
models are identified to cover most of the forms of international proliferation of Internet
technology. Patterns identified include building national backbones, grass root nets,
commercial carriers and resellers. Issues about the impediments to network diffusion are
also addressed in this paper.
Computerization And Social Transformations. Kling R. Science Technology and Human
Values. 16: (3) 342-367 SUM 1991, 31.
This paper examines the relationship between the use of computer-based systems and
transformations in parts of the social order. Answers to this question rest heavily on the
way computer-based systems are consumed -- not just produced or disseminated. The
discourse about computerization advanced in many professional magazines and the mass
media is saturated with talk about "revolution" -- and yet, substantial social changes are
often difficult to identify in carefully designed empirical studies. The paper examines
qualitative case studies of computerization in welfare agencies, urban planning,
accounting, marketing, and manufacturing to examine the ways that computerization
alters social life in varied ways: sometimes restructuring relationships and in other cases,
reinforcing existing social relationships. The paper also examines some of the theoretical
16
issues in studies of computerization, such as drawing boundaries. It concludes with some
observations about the sociology of computer science as an academic discipline.
17
Database
Introduction
Database systems continue to be a key area in many fields including business, computer
science, and engineering. Representing knowledge within a computer is one of the central
challenges of the field. Database research has focused primarily on this fundamental
issue. Many universities have faculty investigating these problems and offer courses that
teach the concepts developed by this research program. Today, the Internet is considered
by many to be one large database. Database research has migrated from a study of data
modeling for a centralized data store, to studies on highly distributed, heterogeneous,
dynamic, and enormous collections of multimedia data.
Key Theories
E.F. Codd and Peter Chen developed several early key theories in database research. E.F.
Codd developed the relational model for databases and Peter Chen introduced the entityrelationship model. These theories are covered in greater detail under the respective
researcher. More recent database theories adopt an object-oriented design and respond to
the effects of distributed databases, such as the Internet, and larger and faster data storage
capabilities.
Key Issues
There continues to be active and valuable research on representing and indexing data,
adding inference to data search, compiling queries more efficiently, executing queries in
parallel, integrating data from heterogeneous data sources, analyzing performance, and
extending the transaction model to handle long transactions and workflow (transactions
that involve human as well as computer steps). The availability of very-large-scale
(tertiary) storage devices has prompted the study of models for queries on very slow
devices.
Future Research
There is great interest and direction in unifying object-oriented concepts with the
relational model. New data types (image, document, drawing) are best viewed as the
methods that implement them rather than the bytes that represent them. By adding
procedures to the database system, one gets active databases, data inference, and data
encapsulation. This object-oriented approach is an area of active research in academe and
in industry. Continuing research is creating the ideas and training the people for the next
product generation. As storage devices continue to become larger and faster, new data
models will need to be developed to efficiently represent and process the data. The
development of ultra-high-density data storage such as holographic data storage is a
promising innovation in the field of database research.
18
Key Researchers
Peter P. Chen
Contact Information
Louisiana State University, Department of Computer Science
298 Coates Hall
Baton Rouge, LA 70803, USA
(225) 578-2483; [email protected]
Research areas
Dr. Chen is well known as the originator of the Entity-Relationship Model (ER Model),
which serves as the foundation of many systems analysis and design methodologies,
computer-aided software engineering (CASE) tools, and repository systems. Dr. Chen is
currently a member of several XML working groups that are investigating the linkage
between the hypertext concept and the main ERD concept.
Edgar F. Codd
Contact Information
IBM Research Laboratory
San Jose, California
Research areas
Dr. Codd invented the relational data model in a series of research papers published
commencing in 1970. The relational data model is particularly well suited for business
data management. In this model, data are organized into tables. The data can be
manipulated using a relational algebra. SQL is a standard language for talking to a
relational database. Dr. Codd also introduced the concept and rules of data
normalization.
Won Kim
Contact Information
CEO of Cyber Database Solutions, Inc., Austin, Texas
[email protected]
Research Areas
Dr. Kim’s research interests lie in object-oriented databases and modern database
systems. He is a founder of UniSQL and recently published a white paper describing a
framework with which to evaluate the completeness of a product's compliance with seven
major categories of capabilities of object relational databases.
Stuart E. Madnick
Contact Information
Address: E53-321
Department: School Of Management
Title: John Norris Maguire Professor of Information Technology
Email: [email protected]
Phone: (617) 253-6671
URL: http://mit.edu/smadnick/www/home.html
19
Research Areas
Dr. Madnick’s current research interests include connectivity among disparate distributed
information systems, database technology, software project management, and the
strategic use of information technology. He is presently co-director of the PROductivity
From Information Technology (PROFIT) Initiative and co-heads the Total Data Quality
Management (TDQM) research program.
He has been the Principal Investigator of a large-scale DARPA-funded research effort on
Context Interchange which involves the development of technology that helps
organizations to work more cooperatively, coordinated, and collaboratively. As part of
this effort, he is the recent co-inventor on the patent applications "Querying
Heterogeneous Data Sources over a Network Using Context Interchange" and "Data
Extraction from World Wide Web Pages."
He has been active in industry, making significant contributions as a key designer and
developer of projects such as IBM's VM/370 operating system and Lockheed's DIALOG
information retrieval system. He has served as a consultant to many major corporations,
such as IBM, ATandT, and Citicorp. He has also been the founder or co-founder of
several high-tech firms, including Intercomp (acquired by Logicon), Mitrol (acquired by
General Electric's Information Systems Company), and Cambridge Institute for
Information Systems (subsequently re-named Cambridge Technology Group), and
currently operates a hotel in the 14th century Langley Castle in England.
Salvatore T. March
Contact Information
University of Minnesota, Carlson School of Management
3-418 Humphrey Center
(612) 624-2017 [email protected]
Research Areas
Dr. March’s research interests lie in database design, information system development,
and distributed systems. His current research includes distributed database design and
methodology evaluation.
Sudha Ram
Contact Information
Management Information Systems
College of Business and Public Administration
University of Arizona
[email protected]
Research Areas
Dr. Ram's research deals with modeling and analysis of database and knowledge based
systems for manufacturing, scientific and business applications. Her research has been
funded by IBM, NCR, US ARMY, NIST, NSF, NASA, and ORD (CIA). Specifically,
the research deals with interoperability among distributed and heterogeneous database
systems, semantic modeling, data allocation, schema and view integration, intelligent
agents and digital libraries for data management, and automated tools for database
design. E-Business infrastructure and strategy is also one of her favored areas.
20
Joseph S. Valacich
Contact Information
College of Business and Economics
Todd Hall 240D
Washington State University
Pullman, WA 99164-4736
[email protected] (509) 335-1112
Research Interests
His current research interests include electronic commerce, the diffusion of technology in
organizations, group decision behavior, and distance learning.
Key Papers
E. F. Codd: A Relational Model of Data for Large Shared Data Banks. CACM 13(6):
377-387 (1970)
Future users of large data banks must be protected from having to know how data is
organized in the computer (the internal representation). Activities of users at terminals
and most application programs should remain unaffected when the internal representation
of data is changed and even when some aspects of the external representation are
changed. Modifications to data representation will often be needed as a result of changes
in query, update, and report traffic and natural growth in the types of stored information.
Peter P. Chen: The Entity-Relationship Model: Toward a Unified View of Data. ACM
Transactions on Database Systems: Vol. 1, Issue 1, Pages 9-36 (1976)
A data model, called the entity-relationship model, is proposed in this model. This model
incorporates some of the important semantic information about the real world. A special
diagrammatic technique is introduced as a tool for database design. An example of
database design and description using the model and the diagrammatic technique is
given. Some implications for data integrity, information retrieval, and data manipulation
are discussed.
Salvatore T. March, M.J. Prietula: Form and Substance in Physical Database Design: An
Empirical Study. Information Systems Research. December 1991
“Data model issues for object-oriented applications”; Jay Banerjee, Hong-Tai Chou,
Jorge F. Garza, Won Kim, Darrell Woelk, Nat Ballou and Hyoung-Joo Kim; ACM Trans.
Inf. Syst. 5, 1 (Jan. 1987), Pages 3 – 26
“Semantics and implementation of schema evolution in object-oriented databases”; Jay
Banerjee, Won Kim, Hyoung-Joo Kim and Henry F. Korth; Proceedings of the ACM
SIGMOD Annual Conference on Management of data, 1987, Pages 311 – 322
“A distributed object-oriented database system supporting shared and private databases”;
Won Kim, Nat Ballou, Jorge F. Garza and Darrell Woelk; ACM Trans. Inf. Syst. 9, 1 (Jan.
1991), Pages 31 – 51
21
"Semantic Model Support for Geographic Information Systems", Sudha Ram with J. Park
and G. Ball. IEEE Computer, Vol. 32, No. 5, May 1999, pp. 74-81.
"Collaborative Conceptual Schema Design: A Process Model and a Prototype Systems",
Sudha Ram with V. Ramesh. ACM Transactions on Information Systems, Vol. 16, No.
4, Oct. 1998, pp. 347-371.
"Database Allocation in a Distributed Environment: Incorporating Concurrency Control
and Queuing Costs", Sudha Ram with S. Narasimhan. Management Science Vol. 40, No.
8, August 1994.
“Metadata Jones and the Tower of Babel: The Challenge of Large-Scale Semantic
Heterogeneity”, Stuart E. Madnick. 1999 IEEE Meta-Data Conference, April 6-7, 1999
“Properties of storage hierarchy systems with multiple page sized and redundant data”;
Chat-Yu Lam and Stuart E. Madnick; ACM Trans. Database Syst. 4, 3 (Sep. 1979), Pages
345 – 367
“Lessons learned from modeling the dynamics of software development”; Tarek K.
Abdel-Hamid and Stuart E. Madnick; Commun. ACM 32, 12 (Dec. 1989), Pages 1426 –
1438
22
E-Commerce
Introduction
Electronic commerce technologies are the fundamental infrastructure for commerce,
communication and communities in the digital age. Basic advancements in engineering
and computer technologies are spawning an astounding array of new applications which
extend the use of computers and networking into all aspects of economic, social and
political activities. While the vision of a networked, digital society is most compelling,
the continuing process of technological developments and applications poses a serious
challenge in defining research priorities that sufficiently address both the emerging vision
of the future and the need to foster and impart basic scientific body of knowledge. The
goal of basic research in electronic commerce is to foster advances in related areas, to
maximize the synergistic, to increase interdisciplinary understanding of how electronic
commerce technologies affect market processes and welfare, and to assure that electronic
commerce applications achieve their promised efficient outcomes.
Key Issues, Conflicts, and Major Research Problems
1. Infrastructure and system architecture area:
Current efforts are focused on developing secure and reliable transaction infrastructure
and pricing regimes. Critical applications being researched and refined include search and
recommendation algorithms that lay the foundation for commercial interactions. The lack
of interoperability in system architecture and application software highlights the need for
net-centric, component-based technologies. The areas for future research initiative focus
on technologies and applications that facilitate real time interactions among users and
computers, including the use of software agents and intermediaries, human-computer
interface design, and system architecture for remote and real-time interactions. In
addition to technology developments, adequate models and measurements must be
developed to be informed about the status, performance and effect of the underlying
system.
2. The interplay between technological infrastructure and commercial environment:
This interplay results in a number of issues that have economic and social ramifications.
For example, the digital online environment has made privacy and intellectual property
rights the most discussed topic in electronic commerce. Nevertheless, current discussions
are carried out in separate circles that focus on technological choices, legalities or other
limited aspects of these issues. It is critical to understand emerging conflicts in a broader,
interrelated solution space and to promote interdisciplinary dialogue and collaboration in
order to provide guidance for design and rule making within the context of online
environment.
23
Key Researchers
Lynda M Applegate
Harvard University
Graduate School of Business Administration
Web site: http://www.people.hbs.edu/lapplegate/research.html
Research areas
Lynda M. Applegate's research focuses on the influence of information technology on
markets and organizations. Her findings on the evolution of electronic commerce and on
the role of information technology as an enabler of flexible and adaptive organizational
designs and innovative management control systems have been widely published in the
Harvard Business Review, Management Systems Quarterly, Organizational Computing,
Information Systems and Decision Processes, and Operations Research, among other
journals. Applegate recently authored a custom-published casebook, Managing in an
Information Age, and co-author of Corporate Information Systems Management: The
Issues Facing Senior Executives.
Andrew B. Whinston
Center for Research in Electronic Commerce
College and Graduate School of Business
University of Texas at Austin
Web site: http://crec.bus.utexas.edu/abw/main.html
Research areas
His current research spans various realms of Electronic Commerce, its impact on
business protocols and processes, on organizational structure and corporate networks,
electronic publishing, electronic education, complementarity of convergent
computational paradigms and business value of IT. Through diverse initiatives, various
aspects and consequences of the emergent economies over the Internet and corporate
Intranets are studied.
Vladimir Zwass
School of Computer Science and Information Systems
Fairleigh Dickinson University
Web site: http://inside.fdu.edu/pt/zwass.html
He is the Editor-in-Chief of the Journal of Management Information Systems, a
leading journal in the field, and of the International Journal of Electronic
Commerce, the first scholarly journal fully devoted to E-commerce.
Tridas Mukhopadhyay
Professor of Industrial Administration
Director, Institute for eCommerce
Carnegie Mellon University
http://www.gsia.cmu.edu/afs/andrew/gsia/
workproc/roster/fulltime/mukhopadhyay.html
Prof. Mukhopadhyay's research centers on the business value of information, EDI
technology, residential use of the Internet and software cost management.
24
Yannis Bakos
Leonard N. Stern School of Business
New York University
Web site: http://www.stern.nyu.edu/~bakos/
Professor Bakos is an internationally acclaimed expert on electronic commerce,
having pioneered research on the impact of information technology on markets,
and in particular on how internet-based electronic marketplaces will affect pricing and
competition. Professor Bakos is also currently studying pricing strategies for information
goods.
Haim Mendelson
Codirector, center for electronic business and commerce
Stanford University
Web site: http://gobi.stanford.edu/facultybios/bio.asp?ID=104
Organizing for e-business, electronic commerce, electronic networks, financial
markets
Key papers
1. Malone, T. W., Yates, J., and Benjamin, R. I. (1987). Electronic Markets and
Electronic Hierarchies. Communications of the ACM, 30(6), 484-497.
By reducing the costs of coordination, information technology will lead to an overall shift
toward proportionately more use of markets-rather than hierarchies-to coordinate
economic activity.
2. Applegate, L. M., Holsapple, C. W., Kalakota, R., Radermacher, F. J., and Whinston,
A. B. (1996). Electronic commerce: building blocks of new business opportunity. Journal
of Organizational Computing and Electronic Commerce, 6(1), 1-10.
There is much uncertainty in the emerging world of electronic commerce. This
uncertainty spans a variety of areas-management, consumer behavior and technology-but
this is good news. History provides numerous examples where market uncertainty has
created potential for shaping new products, creating markets, and building a loyal
customer base. A good case study of uncertainty management is Microsoft, which in the
turbulent days of the early PC software market shaped an entire industry and continues to
reap the benefits. We are on the brink of changes that are projected to rival in impact the
Industrial Revolution of the 18th and 19th Centuries. Much more than making entirely
new knowledge-based products possible, it is clear that electronic commerce will lead to
a fundamental redefinition of the way business is conducted. All participants in the
business community need to wake up to, understand and adapt to electronic commerce.
They need to redefine their business philosophies and approaches so as to position their
organizations to rise with the tide.
3. Vladimir Zwass. Structure and Macro-level impacts of electronic commerce: From
technological infrastructure to electronic marketplaces
25
Electronic commerce (E-commerce) is sharing business information, maintaining
business relationships, and conducting business transactions by means of
telecommunications networks. Traditional E-commerce, conducted with the use of
information technologies centering on electronic data interchange (EDI) over proprietary
value-added networks, is rapidly moving to the Internet. The Internet's World Wide Web
has become the prime driver of contemporary E-commerce. This paper presents a
hierarchical framework of E-commerce, consisting of three meta-levels: infrastructure,
services, and products and structures, which, in turn, consist of seven functional levels.
These levels of E-commerce development, as well as of analysis, range from the widearea telecommunications infrastructure to electronic marketplaces and electronic
4. Frederick J. Riggins and Tridas Mukhopadhyay "Overcoming EDI Adoption and
Implementation Risks," International Journal of Electronic Commerce, Volume 3,
Number 4, Summer 1999,
The emergence of the Internet as a business-to-business communications tool enables a
new wave of adoption of EDI and other interorganizational systems. Initiators of these
trading-partner relationships must develop concrete strategies for managing the adoption
and implementation risks associated with EDI. They may have to subsidize both the
initial adoption and subsequent internal usage of these systems by their trading partners if
they are to maximize their benefits from the technology. EDI can create strategic value in
certain circumstances. To improve internal processes and thus produce operational
benefits, it must improve the information flow between trading partners to the point
where it exceeds the threshold level. Finally, because the operational benefits of EDI are
context-specific, initiators should require their trading partners to develop specific
metrics to measure its effect.
5. Bakos, Y. "A Strategic Analysis of Electronic Marketplaces," MIS Quarterly, Volume
15, No. 3, September 1991, pp. 295-310.
Information systems can serve as intermediaries between the buyers and the sellers in a
vertical market, thus creating an "electronic marketplace". A major impact of these
electronic market systems is that they typically reduce the search costs buyers must pay
to obtain information about the prices and product offerings available in the market.
Economic theory suggests that this reduction in search costs plays a major role in
determining the implications of these systems for market efficiency and competitive
behavior. This article draws on economic models of search and examines how prices,
seller profits, and buyer welfare are affected by reducing search costs in commodity and
differentiated markets. This reduction results in direct efficiency gains from reduced
intermediation costs and in indirect but possibly larger gains in allocational efficiency
from better-informed buyers. Because electronic market systems generally reduce buyers'
search costs, they ultimately increase the efficiency of interorganizational transactions, in
the process affecting the market power of buyers and sellers. The economic
characteristics of electronic markets, in addition to their ability to reduce search costs,
create numerous possibilities for the strategic use of these systems.
26
Group Support System (GSS)
Introduction and Key Theories
Group Support Systems (GSS) are interactive computer-based environments that support
concerted and coordinated team effort toward completion of joint tasks. GSS allow
groups to work in parallel, typically under anonymous conditions; which allows for high
volume and high quality of deliverable output. GSS can radically change the dynamics of
group interactions by improving communication, by structuring and focusing problem
solving efforts, and by establishing and maintaining an alignment between personal and
group goals. GSS has been used to benefit to many group processes such as
brainstorming, idea generation, SAandD, JAD, and process modeling. As a result, GSS
research is a field of great breadth that involves not only technological aspects, but also
facts such as teaming, facilitation, and group dynamics. One important effect of GSS is
its role of increasing intellectual bandwidth. According to Dr. Jay Nunamaker,
information flows into knowledge management systems (KM) and group support systems
(GSS), and these two systems work synergistically to leverage intellectual bandwidth.
Key Issues and Conflicts
Distributed collaboration is viewed as the major issue. A distributed group support
system has to enable both the facilitator and the participants to perform their tasks. The
facilitator needs a way to monitor the interactions in order to control the collaboration
process. The participants also need a means for communicating with the facilitator as
well as other participants. Another key issue for distributed collaboration is whether the
distributed users can develop the level of awareness and trust required for effective
collaboration. Furthermore, connectivity is a key technological issue for the success of
distributed meetings. Connectivity is especially important for the web-based
collaborations because of the heterogeneity of distributed sites.
Major Research Problems in the Future
The following are key issues and research problems need to be addressed:(this part is
summarized from the article Lessons from a Dozen Years of Group Support Systems
Research: A Discussion of Lab and Field Findings, please see key paper 3 for more
information)
GSS research of distributed groups across different geographical areas (including
distributed facilitation research);
Research of integration of GSS with video conferencing;
Research of integration of GSS with automatic language translation to support
multilingual groups;
Research of GSS transfer and adoption in cultures other than English-speaking countries;
research of GSS to support heterogeneous group; sophisticated GSS software to support
group communication and writing;
Possible uses of GSS in the classroom
27
Key Researchers
Jerry DeSanctis
Fuqua School of Business, Duke University
Awards
Outstanding teacher award, Texas Tech University, 1980
Award for Distinguished Contributed Paper in MIS at the National meeting of
the American Institute for Decision Sciences, 1983
Top Three paper at the Annual Meeting of the International Communication Association,
Human Communication Technology Interest Group, May 1988 (with R. Watson and M.
S. Poole)
Invited member of the doctoral consortium faculty, International Conference on
Information Systems, December 1988
Top Three paper in the Annual Meeting of the International Communication Association,
Human Communication Technology Interest Group, May 1989 (with M.S. Poole)
Invited Chair of the Doctoral Consortium, Thirteenth International Conference on
Information Systems, 1992
Received Best Paper Award, 24th Annual Hawaii International Conference on System
Sciences Collaboration Technology Track, "Using Computing to Improve the Quality
Team Process: Preliminary Observations from the IRS-Minnesota Project," 1991
Current Research
Organizational computing, computer-supported cooperative work and management of
information systems
R. Brent Gallupe
Queens University, School of Business
Current Research
Electronic brainstorming, the history of information systems, E-commerce
management issues, Knowledge management systems, Evaluation of information
systems.
Sara Kiesler
Carnegie Mellon University
Current Research
The social and behavioral aspects of computers and computer-based communication
technologies, the emotional and social effects of computing technology on individuals,
teams, and families; (detailed research areas include: influence of computer networking
on group dynamics and communication in organizations, the research of the causes of
"flaming", the conditions for social equalization on computer networks, the benefits and
costs of open communication on networks, the illusion of electronic privacy, the uses and
misuses of electronic surveys, the formation and conduct of electronic groups,
information sharing on networks, and the impact of computer communication on
peripheral or marginal organizational groups). Current projects: investigations of
household technologies and e-commerce, an NSF-sponsored study on interdisciplinary
collaboration; HomeNet, a field study of families using the Internet
28
Key paper
Galagher, J., Sproull, L., and Kiesler, S. (1998). Legitimacy, authority, and community
in electronic support groups. Written Communication, 15, 493-530.
Jay F. Nunamaker, Jr.
Center for the Management of Information, University of Arizona
Awards
Regents Professor / Soldwedel Chair, 1994 - Present.
Received the DPMA EDSIG Distinguished IS Educator Award.
GroupSystems software received the Editor's Choice Award from PC Magazine, June 14,
1994.
GroupWare Achievement Award, GroupWare Conference, San Jose, 1993
GroupSystems: best of show in the GDSS category, GroupWare Conference, San Jose,
1993.
Arthur Andersen Consulting Professor of the Year Award, 1992
Professional Activity
Editorial board of six journals.
Chairman, ACM Curriculum Committee on Information Systems, 1976-1991.
Track Chairman, Data and Knowledge Bases, Decision Support Systems and Information
Systems, Hawaii Conference 1990 - 1997.
Founding member of International Conference on Information Systems, 1980.
Served on Faculty at AACSB Basic and Advanced Institutes for faculty retraining, 198391.
Current Research
Computer supported collaboration and decision support to improve productivity and
communication.
Wanda J. Orlikowski
MIT Sloan School of Management
Current Research
Organizational changes associated with the use of information technology; the
ongoing relationship between information technologies and organizing
structures, work practices, communication, culture, and control mechanisms;
the use of groupware technologies in organizations; the social and technological aspects
of working virtually.
Key paper
“The Duality of Technology: Rethinking the Concept of Technology in Organizations”,
Organization Science, vol. 3, no. 3, August 1992: 398-427.
Judy Olson
School of Information, University of Michigan
Awards
Amoco Award for Outstanding Teaching, 1980
Administrative Internship, University of Michigan, Office of the President,
1980
Council: Association for Computing Machinery
29
National Research Council Committee on Human Factors, 1982-89
Professional Activity
Editorial Board: Journal of Experimental Psychology: Applied, 1994-present
Editorial Board: Management of Information Systems Quarterly, 1990-94
Editorial Board: Organizational Computing, 1990-present
Editorial Board: Human Computer Interaction, 1982-present
Editorial Board: Psychological Review, 1980-82
Editorial Board: Memory and Cognition, 1977-78
Current Research
Collaboration technology, Human-computer interaction, software design process
Applications of cognitive psychology to business computing and communication
Key paper
"Group Work Close Up: A Comparison of the Group Design Process With and Without a
Simple Group Editor" (with G. M. Olson, M. Storrsten and M. Carter). ACM:
Transactions on Information Systems, 1993.
Sirkaa L. Jarvenpaa
McCombs School of Business, University of Texas at Austin
Awards
Distinguished Visiting Scholar, University of Melbourne, Australia, 1997
Harvard Business School Grant, 1995
The Center for International Business and Education Grant, 1995
Current Research
Clicks and mortars, customer insight, e-commerce, information systems, communication
and trust in global virtual teams
Key Paper
"Is Anybody Out There?: The Antecedents of Trust in Global Virtual Teams," (with K.
Knoll and D. Leidner), Journal of Management Information Systems, 1998
Douglas R. Vogel
Department of Information Systems, City University of Hong Kong
Current Research
Group support systems, business process improvement, executive support
systems, technology support for learning environments, electronic commerce,
virtual organization
Key Paper
Vogel, D. and Nunamaker, J., "Group Decision Support System Impact: MultiMethodological Exploration", Information and Management (1990), 15-28.
Key Papers
1. DeSanctis, G., and Gallupe, R. B. (1987). A Foundation for the Study of Group
Decision Support Systems. Management Science, 33(5), 589-609.
The paper identifies the need of GDSS research, and presents a conceptual overview of
GDSS based on an information-exchange perspective of decision-making. Three levels of
systems are described, representing varying degrees of intervention into the decision
30
process. The paper describes the evolution of GDSS. A multidimensional taxonomy of
systems is proposed as an organizing framework for research in the area. The paper also
identifies three critical environmental contingencies to GDSS design: group size, member
proximity, and the task confronting the group. Potential impacts of GDSS on group
processes and outcomes are discussed, and important constructs in need of study are
identified.
2. Gallupe, R. B., Dennis, A. R., Cooper, W. H., Valacich, J. S., Bastianutti, L. M., and
Nunamaker, J. F. (1992). Electronic Brainstorming and Group Size. Academy of
Management Journal, 35(2), 350-369.
This article summarizes research to determine whether or not group size has an effect on
electronic brainstorming by using different group size. The authors found that larger
groups using GSS indeed generated more, high-quality ideas and experienced higher
levels of satisfaction than groups that did not use technology. However, in small groups
(e.g. 2 group members) technology did not act as a catalyst for higher productivity;
primarily because there was no anonymity and not much production blocking (two
primary reasons larger GSS group succeeded).
3. Nunamaker, J. F., Briggs, R. O., Mittleman, D. D., Vogel, D. R., and Balthazard, P. A.
(1997). Lessons from a Dozen Years of Group Support Systems Research: A Discussion
of Lab and Field Findings. Journal of Management Information Systems, 13(3), 163-207.
The paper presents an overview of GSS research conducted in University of Arizona,
where researchers have built 6 generations of group support systems software, conducted
over 150 research studies and facilitated over 4,000 projects. The paper reports research
results and lessons learned from the studies. The paper also proposes Groupware Grid,
which is a theory-based heuristic model for evaluating the contributions of groupware
technology to team productivity. Research results and lessons are presented from 9 key
areas: 1. GSS in organizations, 2. cross-cultural and multicultural issues, 3. designing
GSS software, 4. collaborative writing, 5. electronic polling, 6. GSS facilities and room
design, 7. leadership and facilitation, 8. GSS in classroom, and 9. business process
reengineering.
4. Nunamaker, J. F., Dennis, A. R., Valacich, J. S., Vogel, D. R., and George, J. F.
(1991). Electronic Meeting Systems to Support Group Work. Communications of the
ACM, 34(7), 40-61.
This is a "classic" GSS article written by Dr. Nunamaker, et al. This is one of the
fundamental, early guides to GSS. The article explains the group losses and gains of a
group meeting, discusses the potential benefits of using GSS by increasing group gains
and decreasing group losses. GSS utilizes four mechanisms to support a meeting: process
support, process structure, task support, and task structure. The paper also discusses the
specific implementation of GSS through GroupSystems, a GSS software developed at the
University of Arizona. Three facilitation styles are discussed, and how GSS strongly
supports an integrative facilitation style is illustrated.
31
5. Fjermestad, J., and Hiltz, S. T. (1999). An assessment of Group Support Systems
Experimental Research: Methodology and Results. Journal of Management Information
Systems, Vol. 15 No. 3, Winter 1999 7-150
This landmark paper summarizes the methods and results of the whole area of
experimental GSS studies published in the English language in referred academic
journals. The paper specifically excludes case studies from the field, focusing on
analyzing experimental results. The paper presents an exhaustive list of authors, editors,
reviewers, and major GSS researchers at press time. In addition to the exhaustive
bibliography, the authors offer clear, readable tables summarizing each experiment, and
detailing research methods, hypotheses, and results for 200 experiments. The authors also
offer a classification scheme for the dependent and independent variables in these
experiments, examining which are initial causes, which are intervening variables, and
which are outcome variables. This paper can serve as an outstanding pedagogical
resource for courses in MIS research and research methodologies.
6. Nunamaker, J. F., Chen, M., and Purdin, T.D.M. Systems Development in Information
Systems Research. Journal of Management Information Systems, Vol. 7, No.3, Winter
1990-1991, 89-106
The paper discusses the methodology of MIS research such as theory building,
experimentation, observation and system development. The contribution of the paper is
that it discusses the validity of MIS research as a research domain and proposes system
development as a valid and critical research methodology in MIS. The paper illustrates
MIS research is multimethodological and multidimensional, integration of system
development and traditional research methodology can lead to fruitful MIS research.
32
Information Economics
Key Issues and Conflicts
The interdisciplinary research of information economics draws on principles of
information science, economics, management, political science, public policy,
organizational theory, psychology, ethics, and computer science to propose answers to
the tough new questions confronting the networked society:
When does sharing proprietary information improve a firm’s competitive stance?
Does information technology encourage or impede information equality?
When does it make economic sense to give away information products for free?
Does the Internet require a new regulatory paradigm?
What business models work for information commerce, and how should information
goods be priced [1]?
Most Important Theories
Information asymmetry
Bayes, decision theory, and choice
Principal-agent models
Moral hazard
Adverse selection
Revelation mechanisms
Concepts of information
Shannon entropy
Turing machine (instructional/computational)
Information pricing
Value
Hedonics
Options
Packaging information
Macroeconomic effects
Growth theory
Information markets
Intellectual property
Creation incentives vs. monopoly costs
Patents and copyrights
Information and social policy [2]
References:
[1] University of Michigan School of Information,
http://www.si.umich.edu/academics/iemp/
[2] University of Michigan School of Information,
http://www.si.umich.edu/Classes/646/#itopics
33
Key Researchers
Erik Brynjolfsson
Massachusetts Institute of Technology
Email: [email protected]
Webpage: ebusiness.mit.edu/erik
Research area: Information technologies and productivity, Internet implications
for pricing, organizational change
Charles H. Kriebel
Carnegie Mellon University
Email: [email protected]
Research area: Computers and information systems, information economics,
telecommunications, management science, operations management, robotics,
applied economics, productivity, manufacturing systems, information resource
management.
Tridas Mukhopadhyay
Carnegie Mellon University
Email: [email protected]
Research area: Business value of information technologies, business-to-business
commerce, residential use of the Internet, software cost management.
Andrew B. Whinston
University of Texas at Austin
Email: [email protected]
Webpage: cism.bus.utexas.edu
Research area: Artificial intelligence, e-commerce, information systems, the new
economy
Key papers
Masuda Y. “Conceptual Framework Of Information Economics.” IEEE-Transactions-onCommunications, October 1975, 23: (10) 1028-1040.
Information economics is a new system of economics, overriding the classical school of
economics, and at the same time it is a future economics. Three basic concepts of
economics constitute the framework of information economics. The first of them is the
spirit of globalism-the ideas of spaceship, quality of time, and coexistentialism. The
second is information productivity. The development of computer and communication
technologies has made possible mass production of objective-oriented, logical, normative
information. The third is time value-a new view of values. By time value is meant the
value that is created through objective-oriented utilization of free time at the disposal of
human beings. Just as each new theory of economics has a new vision, information
economics has a vision-Global Futualization Society as the society where a large variety
34
of voluntary communities will flourish on a global scale at a time, and the individual will
seek to realize self-acturalization in each community.
Barua, A., Kriebel, C.H., Mukhopadhyay, T. “An Economic Analysis of Strategic
Information Technology Investments.” MIS Quarterly, September 1991, Vol. 15, Iss. 3,
313-332.
The strategic impacts of information technology (IT) investment are studied through the
development of a formal economic model. In particular, the study focuses on IT-related
quality competition in a duopoly, where the services may not be priced initially and
where the benefits may come indirectly. A firm may have to invest in IT, regardless of its
underlying cost structure, as a response to its competitor's investment level. Both firms
prefer sequential over simultaneous investments, even when both have the required
technology. While the IT-inefficient firm has followership incentives, the leadership
incentives for the IT-efficient firm depend on the difference in IT cost structures and on
the degree of substitutability between the services of the 2 firms. For dynamic markets
with new consumers, the negative effect of switching cost on the welfare of existing
consumers is reduced when the IT-efficient firm moves first.
Clemons E., Kleindorfer P. “An Economic-Analysis Of Interorganizational Information
Technology.” Decision Support System, September 1992, 8: (5) 431-446.
This paper first reviews some basic results on the economics of information technology
(IT) and strategy. These results begin by developing a model of interorganizational IT,
focusing on supplier-buyer interactions and the costs and benefits of IT in facilitating
such interactions. The modeling framework incorporates economies of scale and scope,
transactions specific sunk costs of IT development, and related issues of bargaining and
opportunism. Results of the model are applied to the increasingly important topic of
interorganizational information systems, addressing some of the risks of cooperative
ventures that are frequently overlooked in the MIS literature.
Kriebel C., Barua A. and Mukhopadhyay T. “Information Technologies and Business
Value: An Analytical and Empirical Investigation.” Information Systems Research,
March 1995, Vol. 6, Iss. 1, 3-24.
An important management question today is whether the anticipated economic benefits of
information technology (IT) are being realized. In an analysis, this problem is considered
to be measurement related, and a new process-oriented methodology for ex post
measurement is proposed and tested to audit IT impacts on a strategic business unit
(SBU) or profit center's performance. The IT impacts on a given SBU are measured
relative to a group of SBUs in the industry. The methodology involves a 2-stage analysis
of intermediate and higher level output variables that also accounts for industry and
economy wide exogenous variables for tracing and measuring IT contributions. The data
for testing the proposed model were obtained from SBUs in the manufacturing sector.
The results show significant positive impacts of IT at the intermediate level. The study
provides a practical management tool to address the question of why (or why not) certain
IT impacts occur.
35
Nadiminti R., Mukhopadhyay T., Kriebel C.H. “Risk aversion and the value of
information.” Decision Support System, March 1996,16: (3) 241-254.
Determining the value of information is a fundamental research problem for information
system scientists. Unfortunately, very little research exists that examines the relationship
between risk aversion and the value of information. This is surprising because empirical
studies show that most managers are risk averse rather than risk neutral. Moreover, the
small literature that exists appears to be in conflict. We have developed a framework to
examine the relationship between the value of information and risk aversion. We show
that the method of payment for information must be considered in determining this
relationship. We have used the Arrow-Pratt measure of risk aversion to derive explicit
conditions under which the value of information increases (decreases) with risk aversion.
From our analysis it is clear that earlier work has depicted a limited view of the
relationship between risk aversion and value of information. Our analysis is applicable to
the ex-post evaluation of transaction processing systems and a subset of decision and
expert support systems.
Brynjolfsson, E. and Hitt, L. “Paradox Lost? Firm-level Evidence on the Returns to
Information Systems Spending.” Management Science, April 1996.
The "productivity paradox" of information systems (IS) is that, despite enormous
improvements in the underlying technology, the benefits of IS spending have not been
found in aggregate output statistics. One explanation is that IS spending may lead to
increases in product quality or variety which tend to be overlooked in aggregate output
statistics, even if they increase sales at the firm-level. Furthermore, the restructuring and
cost-cutting that are often necessary to realize the potential benefits of IS have only
recently been undertaken in many firms. Our study uses new firm-level data on several
components of IS spending for 1987-1991. Our results indicate that IS have made a
substantial and statistically significant contribution to firm output.
Hitt, L. and Brynjolfsson, E. “Productivity, Profit and Consumer Welfare: Three
Different Measures of Information Technology's Value.” MIS Quarterly, June 1996.
The business value of information technology (IT) has been debated for a number of
years. While some authors have attributed large productivity improvements and
substantial consumer benefits to IT, others report that IT has not had any bottom line
impact on business profitability. In this paper, we focus on the fact that while
productivity, consumer value and business profitability are related, they are ultimately
separate questions. Accordingly, the empirical results on IT value depend heavily on
which question is being addressed and what data are being used. Applying methods based
on economic theory, we are able to define and examine the relevant hypotheses for each
of these three questions, using recent firm-level data on IT spending by 370 large firms.
Our findings indicate that IT has increased productivity and created substantial value for
consumers. However, these benefits have not resulted in supernormal business
profitability. We conclude that while modeling techniques need to be improved, these
results are consistent with economic theory. Thus, there is no inherent contradiction
between increased productivity, increased consumer value and unchanged business
profitability.
36
Brynjolfsson, E. “The contribution of information technology to consumer welfare.”
Information Systems Research, September 1996 Vol. 7, Iss. 3 pg. 281, 20 pgs.
Over the past 2 decades, US businesses have invested heavily in information technology
(IT) hardware. Managers often buy IT to enhance customer value in ways that are poorly
measured by conventional output statistics. Further, because of competition, firms may be
unable to capture the full benefits of the value they create. This undermines researchers'
attempts to determine IT value by estimating its contribution to industry productivity or
to company profits and revenues. An alternative approach estimates the consumers'
surplus from IT investments by integrating the area under the demand curve for IT. Using
data from the US Bureau of Economic Analysis, 4 measures of consumers' surplus are
estimated: 1. Marshallian surplus, 2. Exact surplus based on compensated (Hicksian)
demand curves, 3. a nonparametric estimate, and 4. a value based on the theory of index
numbers. All 4 estimates indicate that in the base year of 1987, IT spending generated
approximately $50 billion to $70 billion in net value in the US and increased economic
growth by about 0.3% per year. According to conservative estimates, IT investments
generate approximately 3 times their cost in value for consumers.
37
Information Retrieval
Key Issues
The techniques used in information retrieval are as follows:
(1) Automatic Text Analysis - concerns how the text of a document is represented inside a
computer.
(2) Automatic Classification - looks at automatic classification methods.
(3) File Structures - from the point of view of someone primarily interested in
information retrieval.
(4) Search Strategies - search strategies when applied to document collections structured
in different ways.
(5) Probabilistic Retrieval - a formal model for enhancing retrieval effectiveness by using
sample information about the frequency of occurrence and co-occurrence of index terms
in the relevant and non-relevant documents.
Trends
(1).
(2).
(3).
(4).
(5).
(6).
Multimedia Information Retrieval
Collaborative Information Retrieval
Multilingual Information Retrieval
Semantic Web (linked concept)
Text Mining, Web Mining
Mobile /Wireless Computing
Key People
Gerard Salton
Description
Professor, Computer Science at Cornell University.
Founder of Information Retrieval, died of cancer on 28 August, in Ithaca,
NY (1927-1995). ACM Award for Outstanding Contributions in 1983 (The
first such award was given to G. Salton)
Research Interests
Natural language processing, information retrieval
Karen Sparck Jones
Description
Computer Laboratory, University of Cambridge
Interests
She has worked in automatic language and information processing research since the late
fifties, beginning her career at the then Cambridge Language Research Unit. She has
many publications including several books. Her work in the last decade has been on
document retrieval including speech applications, database query, user and agent
modeling, summarizing, and information and language system evaluation.
38
Gary Marchionini
Description
Current Position: Professor, College of Library and Information Services
Research Interests
Information seeking, human-computer interaction, digital libraries,
information design, information policy.
Edward A. Fox
Description
Professor, Computer Science, Virginia Polytechnic Institute and State
University.
Research Interests
Multimedia information storage and retrieval; digital libraries;
hypertext/hypermedia; electronic publishing and text processing;
educational technology and distance learning; library automation;
artificial intelligence.
W. Bruce Croft
Description
Professor, Department of Computer Science at the University of Massachusetts, Amherst.
Research Interests
His research interests are in formal models of retrieval for complex, text-based objects,
text representation techniques, the design and implementation of text retrieval and routing
systems, and user interfaces. He has published more than 100 articles on these subjects.
This research is also being used in a number of operational retrieval systems.
Key Papers
Automatic Text Structuring and Summarization. Gerard Salton, Amit Singhal, Mandar
Mitra, Chris Buckley: Information Processing and Management 33(2): 193-207 (1997)
In recent years, information retrieval techniques have been used for automatic generation
of semantic hypertext links. This study applies the ideas from the automatic link
generation research to attack another important problem in text processing - automatic
text summarization. An automatic 'general purpose' text summarization tool would be of
immense utility in this age of information overload. Using the techniques used (by most
automatic hypertext link generation link algorithms) for inter-document link generation,
we generate intra-document links between passages of a document. Based on the intradocument linkage pattern of a text, we characterize the structure of the text. We apply the
knowledge of text structure to do automatic text summarization by passage extraction.
We evaluate a set of fifty summaries generated using our techniques by comparing them
to paragraph extracts constructed by humans. The automatic summarization methods
39
perform well, especially in view of the fact that the summaries generated by two humans
for the same article are surprisingly dissimilar.
Automatic Construction of Networks of Concepts Characterizing Document Databases,
Chen, H., and Lynch, K. J. (1992).. Paper presented at the IEEE Transactions on
Systems, Man, and Cybernetics.
We report results of a study that involved the creation of knowledge bases of concepts
from large, operational textual databases. Two East-bloc computing knowledge bases,
both based on a semantic network structure, were created automatically using two
statistical algorithms. With the help of four East-bloc computing experts, we evaluated
the two knowledge bases in detail in a concept-association experiment based on recall
and recognition tests. In our experiment, one of the knowledge bases that exhibited the
asymmetric link property out-performed all four experts in recalling relevant concepts in
East-bloc computing. The knowledge base, which contained about 20,000 concepts
(nodes) and 280,000 weighted relationships (links), was incorporated as a thesaurus-like
component into an.
(12 citations)
Interfaces and tools for the Library of Congress National Digital Library,
Program.Marchionini, G., Plaisant, C., and Komlodi, A. (1998). Information Processing
and Management, 34(5), 535-555.
This paper describes a collaborative effort to explore user needs in a digital library,
develop interface prototypes for a digital library and suggest and prototype tools for
digital librarians and users at the Library of Congress (LC). Interfaces were guided by an
assessment of user needs and aimed to maximize interaction with primary resources and
support both browsing and analytical search strategies. Tools to aid users and librarians in
overviewing collections, previewing objects and gathering results were created and serve
as the beginnings of a digital librarian toolkit. The design process and results are
described and suggestions for future work are offered.
(2 citations)
Theory of term importance in automatic text analysis. Salton, G., Yang, C., and Yu, C.
(1975). Journal Am. Soc. Inform. Sci., 26(1), 33-44.
Evaluating natural language processing systems, Karen Sparck Jones, J.R. Galliers ,
springer, 1996.
This report presents a detailed analysis and review of NLP evaluation, in principle and in
practice. Part 1 examines evaluation concepts and establishes a framework for NLP
system evaluation. This makes use of experience in the related area of information
retrieval and the analysis also refers to evaluation in speech processing. Part 2 surveys
significant evaluation work done so far, for instance in machine translation, and discusses
the particular problems of generic system evaluation. The conclusion is that evaluation
strategies and techniques for NLP need much more development, in particular to take
proper account of the influence of system tasks and settings. Part 3 develops a general
approach to NLP evaluation, aimed at methodologically sound strategies for test and
evaluation.
40
Knowledge Management
Introduction
As the attention of human beings becomes the most critical resource in the information
age, the need to manage vast amount and different levels of knowledge (see Figure 1)
becomes apparent. Knowledge management is a discipline that promotes an integrated
approach to identifying, capturing, retrieving, sharing and evaluating an enterprise’s
information assets. These information assets may include databases, documents, policies
and procedures as well as the un-captured, tacit expertise and experience resident in
individual workers.
KMS Understanding Hierarchy
Context
Wisdom
Principles
High
Knowledge
Patterns
Information
Relations
Low
Data
Symbols
Noise Detection
Easy
Difficult
Figure 1. KMS Understanding Hierarchy
Categories of Knowledge Management Research
Knowledge management investigates areas such as visualization, categorization,
representation of data, information, knowledge and wisdom to enable transfer and sharing
of knowledge and information to other groups and people. This discipline is essentially
divided into technical aspect and behavioral aspect. The technical aspect is composed of
four categories, namely, information retrieval, digital library, collaboration, and data
mining. The behavioral aspect is composed of four categories, namely, consulting in
knowledge management, best practices, organizational memory, knowledge networking /
integration.
41
Key Theories and Methodologies
Knowledge Management is a cross-disciplinary research area. The key theories and
methodologies in the behavioral side include cognitive psychology theories, human
communication theories, and group theories. The key theories and methodologies in the
technical side include statistical theories, self-organizing map, mathematical
representation schemes, automatic text processing methods, workflow technologies,
agent theory, ontology, meta-data and various visualization techniques.
Key Issues
The technical aspect of knowledge management is concerned with how to capture
semantic knowledge and meanings, how to visualize knowledge, how to integrate
knowledge, and how to deal with multilingual knowledge. The behavioral aspect of
knowledge management is concerned with what are the best practices, organizational
change and reward, case studies in knowledge management, and social and human aspect
of knowledge management. The technical and behavioral aspects drive each other to
enhance the field of knowledge management.
Future Research Trends
Relevance -- having all the available, relevant knowledge available for decision-making.
Dynamism -- knowledge about the state of multiple processes operating in parallel and
affecting each other in a coordinated way.
Community -- a collective environment that actively supports sharing through automatic
capture in sharable form and explicit policies and open cultures that promote sharing.
Key Researchers
Christine L. Borgman
Contact Information
Department of Information Studies
Graduate School of Education and Information Studies
University of California, Los Angeles
http://dlis.gseis.ucla.edu/cborgman/
Research Areas
Her research interests include digital libraries, human-computer interaction, information
seeking behavior, and scholarly communication and bibliometrics, as well as information
technology policy in Central and Eastern Europe.
Hsinchun Chen
Contact Information
MIS Department, McClelland Hall 430Z
Karl Eller Graduate School of Management
University of Arizona
http://ai.bpa.arizona.edu/html/faculty.html
42
Research areas
Professor Chen’s research interests include digital library, intelligent information
retrieval, automatic categorization and classification, concept space generation, automatic
thesaurus browsing and traversal, inductive query by examples, machine learning for IR,
large-scale information analysis and visualization, internet resource discovery,
multilingual IR, collaborative systems, intelligence systems.
W. Bruce Croft
Contact Information
Director, Center for Intelligent Information Retrieval
Department of Computer Science
University of Massachusetts, Amherst
http://www.cs.umass.edu/faculty-bios/croft.html
Research Areas
Professor Croft's research interests are in formal models of retrieval for complex, textbased objects, text representation techniques, the design and implementation of text
retrieval and routing systems, and user interfaces. He has published more than 100
articles on these subjects. This research is also being used in a number of operational
retrieval systems.
Daniel E. O'Leary
Contact Information
School of Business
University of Southern California
http://www.usc.edu/schools/business/atisp/oleary.html
Research areas
His current research examines issues in the areas of Electronic
Commerce, Enterprise Resource Planning Systems, Knowledge Management,
Reengineering and Workflow, and Virtual Organizations. His research employs a number
of methodologies, including analytic, artificial intelligence/expert systems, empirical and
case studies.
Gerard Salton
He was (1927-1995) one of the first programmers for the Harvard Mark
IV computer. The “Father” of Information Retrieval.
Research areas
His research interests are natural language processing and information
retrieval. He began the SMART information retrieval system in the
1960's (allegedly, SMART is known as "Salton's Magical Automatic
Retriever of Text"), and ideas in this work fundamentally changed fulltext processing methods on computers and provided the field of information retrieval
with solid underpinnings.
Key Articles
43
Chen, H.; Houston, A.L.; Sewell, R.R.; Schatz, B.R. (1998) “Internet browsing and
searching: User evaluations of category map and concept space techniques,” Journal of
the American Society for Information Science 49(7), pp.582-603.
The development and refinement of algorithms to improve browsing and searching by
addressing information overload and vocabulary differences are discussed. Whether 2
particular algorithms can help improve browsing and searching the Internet is studied.
The results indicate that a Kohenen self-organizing map-based algorithm can successfully
categorize a large and eclectic Internet information space into manageable sub-spaces
that users can successfully navigate to locate a homepage of interest to them. A study of
an automatically generated concept space algorithm for searching was especially
encouraging. Subjects especially like the level of control they could exert over such a
search.
Salton G. Automatic Text Processing, Addison-Wesley Publishing Company, 1989.
This book deals with the whole area of automatic text processing – that is, the handling of
texts using automatic equipment. The aim is not to teach laymen or humanists how to
program computers to manipulate text, nor to teach scientists language-processing skills.
Instead, this book examines the area of text processing as a whole, describing various
text-processing methodologies and identifying those tasks now undertaken routinely,
while also discussing more experimental procedures not yet ready for operation. This
book is divided into four parts: the first part covers the computer environment and
automated office situation, in which text processing is of particular interest. The second
part covers the main word processing areas, which treat texts on the level of individual
words. The third part covers text-retrieval systems whose operations are normally based
on text units larger than single, individual word forms. The fourth part covers the main
language-analysis and language-processing topics in which text meaning and text
understanding are of principle concern: syntactic and semantic language-analysis
methods that determine language structure and text content, and knowledge-based text
processing.
O'Leary, D.E. “Knowledge-Management Systems: Converting and Connecting”, IEEE
Intelligent Systems and their applications 13(3), May-June 1998, pp.30 –33.
Organizations use knowledge management for a number of reasons, including
environmental pressures, technological advancements, and the ability to create valuable
information. Classic knowledge management thinking assumes that a firm gathers all its
important knowledge in a single place, and employees use it to make good decisions that
will benefit the organization. But this classical thinking is only partially right. The full
range of knowledge management converting and connecting capabilities should include
not only connecting knowledge and people, but also link knowledge to other knowledge
or push knowledge to other knowledge or push knowledge out to employees.
Croft, W.B. “Effective text retrieval based on combining evidence from the corpus and
users,” IEEE Expert 10(6), Dec. 1995, pp.59 –63.
The author surveys the representation, query processing and retrieval techniques used in
the Inquiry system. By combining evidence about relevance from the corpus, individual
44
documents and users, Inquiry achieves effective overall recall and precision evaluation
while avoiding occasional major failures.
45
Operation Research
Introduction
Operation Research (OR) looks at an organization’s operations - the functions it exists to
perform. The objective of Operational Researchers is to work with clients to find
practical and pragmatic solutions to operational or strategic problems, often working
within tight timing constraints.
Organizations may seek a very wide range of operational improvements - for example,
greater efficiency, better customer service, higher quality or lower cost. Whatever the
business engineering aim, OR can offer the flexibility and adaptability to provide
objective help.
Most of the problems OR tackles are messy and complex, often entailing considerable
uncertainty. OR can use advanced quantitative methods, modelling, problem structuring,
simulation and other analytical techniques to examine assumptions, facilitate an in -depth
understanding and decide on practical action.
The future issues will focus on decision analysis, vehicle routing, and effectiveness of
mandatory minimum sentencing and information technology. MIS researcher can look at
the opportunities of facilitating OR with information system, making the switch from
academia to the "real world"
Key People
Hau L. Lee
Stanford University
[email protected]
Supply chain management; Global logistic system design and control;
Multi-echelon inventory systems; Manufacturing and distribution
strategy; Design for supply chain management
Marshall Fisher
The University of Pennsylvania
Lanchester Prize, Management Science, 1977
Supply chain management, retailing
46
James B. Orlin
MIT
[email protected], http://web.mit.edu/jorlin/www/
Mathematical Programming, Combinatorial and Network Optimization,
Design and Analysis of Algorithms and Heuristics, Logistics.
George Nemhauser
[email protected]
School of Industrial and Systems Engineering
Georgia Tech
Lanchester prize (twice)
Discrete optimization, solving large-scale mixed-integer programming
problems, crew and fleet scheduling problems in the airline industry.
Ellis Johnson
School of Industrial and Systems Engineering,
Georgia Tech
[email protected]
Lanchester Prize 1983
Mathematical programming and integer programming; theories on
computational approaches; applications in manufacturing, distribution,
and transportation.
Paul H. Zipkin
Fuqua School of Business,
Duke University
[email protected]
Operations Management; Inventory Management; Supply-chain
Management and Analysis; Product variety; design of logistics networks
Moshe Dror
The University of Arizona
[email protected]
Combinatorial Optimization in Logistics and Manufacturing Systems;
Cooperative Game Theory and Cost Allocation in Inventory and
Combinatorial Problems; Agent Theory and Applications in Operations
Management.
Key Papers
47
Jack Edmonds, “Maximum matching and a polyhedron with 0,1-variation”, Journal of
Research of national Bureau of Standards, 69 (1965), 123-130
Jack Edmonds, “Paths, Trees, and Flowers”, Canadian Jornal of Mathematics, 1965
Thomas L. Saaty, and Chen, Kun Yuan, Hoover's problem. Math. Mag. 51 (1978) 288292 05C20
Ellis Johnson, Manfred Padberg, and Harlan Crowder", Solving Large-Scale Zero-One
Linear Programming Problems" Operations Research, 31:5 (1983), pp. 803-834.
Hau L. Lee, Material Management in Decentralized Supply Chains, Operations
Research, vol. 41 1993
Hau L. Lee, Hau. Information distortion in a Supply Chain: The Bullwhip Effect,
Management Science, 43, 4 1997
James Orlin and Rina R. Schneur, A Scaling Algorithm for Multicommodity Flow
Problems" Operations Research 46, (1998), 231-246.
Dror, M. and Trudeau, P., (1989). "Savings by Split Delivery Routing", Transportation
Science 23, 141-145
Dror, M., Stern, H.I., and Lenstra, J.K., (1987). "Parallel Machine Scheduling:
Production Rates Dependent on Number of Jobs in Operation", Management Science 33,
1001-1009
Cachon, G. and M. Lariviere. 1999. An Equilibrium Analysis of Linear and Proportional
Allocation of Scarce Capacity. IIE Transactions. 31 (9) 835-850.
Cachon, G. and M. Lariviere. 1999. Capacity Choice and Allocation: Strategic Behavior
and Supply Chain Performance. Management Science. 45 (8) 1091-1108.
Glasserman P Introduction to the special issue on stochastic models and simulation
MANAGE SCI 46: (9) III-IV SEP 2000
Glasserman P, Wang YS Leadtime-inventory trade-offs in assemble-to-order systems
OPER RES 46: (6) 858-871 NOV-DEC 1998
Masuda Y, Whang S Dynamic pricing for network service: Equilibrium and stability
MANAGE SCI 45: (6) 857-869 JUN 1999
Barnett A.l., Comment on a Market Share Theorem-comment, J Marketing Research, 13:
(3) 312-312 1976
Zipkin P. H., Performance Analysis of a Multiitem Production-Inventory System Under
Alternative Policies, Manage Sci. 41: (4) 690-703 APR 1995
48
Zipkin P.H. Computing Optimal Lot Sizes in the Economic Lot Scheduling Problem,
Operation Research, 39: (1) 56-63 JAN-FEB 1991
Kelton W.D., Random Initialization methods in Simulation, IIE TRANS 21: (4) 355-367
DEC 1989
Chen, F. Optimal Policies for Multi-Echelon Inventory Problems with Batch Ordering.
Operations Research 48, 376-389. 2000.
49
Social/Ethical/Psychological Issues
Introduction
Social, psychological, and ethical issues are important factors to consider in regards to
information systems research because of the way they directly affect its users. Social
issues address the impacts of the computer technologies that are currently available on
organizations, individuals, and communities. Ethical issues involve privacy concerns,
moral dilemmas, and sensitive information. The psychological issues within technology
research deal with the cognitive and emotional states of people utilizing it. From these
areas of research, self-regulation, laws governing computer technology, sociological and
psychological well beings of people stems from these areas of research.
Most Important Theories
Some important theories, hypothesis, and models to come from this area of research are
the Media Richness Theory, Social Presence Theory, SIDE theory, Computers as Social
Actors, and Internet Addiction Theory.
Key Issues, Conflicts, and Major Research Problems
Amongst this body of literature, there are three major arguments that researchers uphold.
The first is the ethical use of using subjects over the Internet. When looking at the social
and psychological impacts of technology, a vast majority of research has been pertaining
to areas involving the Internet (e.g., e-commerce, distance learning, privacy issues).
Therefore, researchers raise the questions if it is considered ethical to monitor
transactional behaviors of consumers and/or read through e-mail messages and postings
found in chat rooms without the users consent. Another research problem is the ability to
be able to study technology that is always in flux.
50
Key Researchers
Mary J. Culnan
Contact Information
The McDonough School of Business, Georgetown University
Washington D.C., 20057-1008
(202) 687-3802; e-mail: [email protected]
Research areas
Dr. Culnan’s research focus is on how information technology is impacted by social and
public policies and information privacy issues. She is currently working on the
Georgetown Internet Privacy Policy Study (GIPPS) and also looks at trends in consumer
attitudes and electronic marketing.
Sara Kiesler
Contact Information
3513 Newell-Simon Hall
Carnegie Mellon University
5000 Forbes Ave.
Pittsburgh, PA 15213-3891
(412) 268-2888; e-mail: [email protected]
Research Areas
Dr. Kiesler has been currently working on the social, emotional, and behavioral impacts
of computing on individuals, families, and teams. She is best noted for her NSF
sponsored research regarding interdisciplinary collaborations and a system called
HomeNet, designed to study Internet usage among families. Other significant
contributions to the field by Dr. Kiesler include issues regarding e-mail flaming and
standards, formation of electronic groups, and social equalization and is currently a
Professor in the Human Computer Interaction Institute.
Robert Kling
Contact Information
School of Library and Information Science
Indiana University at Bloomington
107 S. Indiana Avenue
Bloomington, IN 47405-7000
(812) 855-9763, e-mail: [email protected]
Research areas
Social consequences of computerization and how it affects the public, computer ethics,
and personal privacy are major issues Dr. Kling focuses on. Currently he is working on
areas pertaining to scholarly communication and the use of electronic media to support it.
He has authored over 4 books pertaining to computerization, social impacts, and
controversies.
Donald Norman
Contact information
51
Apple Computer, Inc. MS 301-4UE
1 Infinite Loop, Cupertino, CA 95014 USA
(408) 862-5515; e-mail: [email protected]
Research areas
Dr. Norman is a leading researcher on human cognition and the interaction of technology
and society. He has taken his findings from the field of academics, leaving the
University of California, San Diego, and working for Apple Computer and being the
President of UNext.com Learning Systems. He is interested in how people utilize
technology and the impact that has on society.
Gary Olson
Contact Information
306A West Hall
550 E. University
Ann Arbor, MI 48109-1092
(734) 647-3576; e-mail: [email protected]
Research areas
Topics of specialization for Dr. Olson include computer support for collaboration issues,
policy formation, and decision-making. He is interested specifically in cognitive
psychology and human-computer-interaction. His background is in psychology and he
implements theories of psychology to social issues governing the use of computers. The
NSF, NICH, Apple computers, Arthur Andersen and Co, and Ameritech have funded his
research.
Lee Sproull
Contact Information
Leonard N. Stern School of Business
New York University
New York, New York
Research areas
Dr. Sproull’s research focuses on social and organizational implications of technology.
So far, she has published more then 50 books and articles on these topics. She is
currently working on the dynamics and consequences of electronic groups and
communities. Among her achievements are emphasizing connections between different
academic disciples and was a founding member of the Interdisciplinary department of
social and decision sciences at Carnegie Mellon University.
Key Papers
Birnbaum, M. H. (2000). Psychological experiments on the Internet. Academic Press:
San Diego, CA.
Gackenbach, J. (1998). Psychology and the Internet: Intrapersonal, interpersonal, and
transpersonal implications. Academic Press: San Diego, CA.
52
Kling, R. (1980). Social analyses of computing: Theoretical perspectives in recent
empirical research. Computing surveys, 12, 62-89.
This article examined empirical studies of computing use in organizations and in public
life. The roles of computer technologies for innovation, in the work life, in decision
making, and in influencing power are examined. In addition, this article also reviews the
privacy and social accountability issues. This articles groups analyses of the social
character and development of computing into two major perspectives: system rationalism
and segmented institutionalism.
Kraut, Kiesler, Mukhopadhyay, Scherlis, and Patterson. (1998). Social impact of the
Internet: What does it mean? Communications of the ACM (41), 12.
According to prior research involving studies regarding the HomeNet project, results
were found that people using the Internet incurred declines in social and psychological
well-being. Depression increased, communication between friends and family decreased,
and people overall felt lonelier even though the purpose for using the Internet was to
increase their interpersonal communication. Other outcomes of the study showed that
there is a difference between people who have positive versus negative attitudes about the
Internet. People with positive attitudes are not as concerned with their privacy, perceive
shopping by mail as beneficial, and have coping strategies for dealing with unwanted
mail. The authors give future research suggestions including focusing on characteristics
such as the sensitivity of the information, its source, its perceived relevance to the
original transaction, and whether disclosure reflects informed consent or results in a
potentially harmful outcome to the individual. This has implications for MIS research
involving e-commerce. Due to findings, MIS e-commerce research needs to take into
consideration people's attitudes about the Internet so that they can target ways in which to
assure people of their privacy and also encourage on-line shopping.
Norman, D. (1988). Psychology of the everyday things, Chapter 1, pp. 1-33. In Design of
Everyday Things.
Within the first chapter of his book, the concept of affordances, perceived and actual
properties of things, is introduced. Dr. Norman suggests that it is important to make
affordances visible, participate in natural mappings, taking advantage of physical
analogies and cultural understandings, and integrating user feedback. His discussion
revolves around taking a user-based center when designing anything from hardware to
software to tools. At times, MIS researchers focus on task and problem solving with little
regards to the user. The field of MIS research can benefit by reading this chapter as it
allows for awareness of user importance in design.
Turkle, S. (1995). Life on the screen: Identity in the age of the Internet. Simon and
Schuster.
Turkle's book is one of the first books to really describe ethnographically how people are
currently using the Internet and the possibilities of future use. She observes different online cultures (e.g., MOOs, MUDs, Chatrooms) and how they compare to real life
communities. This book can be beneficial for MIS researchers to read to use as a basic
understanding of how people are using new technologies and the social norms that are
already established on-line. They can in turn use this found knowledge by learning how
53
to redesign systems that are already in place to better serve its users. They can also
research into how people are using the systems already and project and propose future
research and better systems.
54
Supply Chain Management
Most Important Theories
To compete successfully in the global market, companies need to manage the
effectiveness and efficiency of the operations that manufacture and distribute their
products or services to their customers. Supply chain management deals with the
management of materials, information and financial flows in a network consisting of
suppliers, manufacturers, distributors, retailers, and customers. Many industries have
found it challenging to manage these flows efficiently and effectively.
There are three types of flows in a supply chain that require careful planning and
coordination. Material flows involve both physical product flows from suppliers to
customers through the chain as well as the reverse flows via product returns, servicing,
recycling, and disposal. Information flows involve order transmission and delivery status.
Financial flows involve credit terms, payment schedules, and consignment and title
ownership arrangements. These flows cut across companies and sometimes ownership
arrangements. These flows cut across companies and sometimes even industries [1].
Key Issues and Conflicts
The research of Supply Chain Management processes focuses on the coordination and
integration of the flows in a supply chain consisting of multiple sites and organizations
with multiple independent decision makers. The types of research in Supply Chain
Management can be:
Theoretical work motivated by real life problems and situations
Applications based on real cases
Conceptual work that provides a framework to analyze problems in industry
Empirical studies based on real data
Surveys of existing literature and industrial practice [1]
Key research issues and topics include: product and process designs for supply chain
management; structuring supply chains for mass customization; third party logistics;
outsourcing and contract manufacturing; supplier contracting; incentive and performance
measures; global supply chain management; quick response and cycle time reduction;
multi-product and multi-location production and inventory coordination; consolidation,
warehousing, scheduling and coordination of transportation and production flows; and
industry-wide supply chain integration.
References:
[1] “Editorial objectives for Supply Chain Management.” Management Science,
http://www.informs.org/Pubs/Mansci/statements.html#SUP
[2] Discussion with Dr. Danial Zeng, Department of MIS, University of Arizona,
December 12, 2000.
55
Key researchers
Gerard P. Cachon
University of Pennsylvania (2000 – present), Duke University (previous)
Email: [email protected]
Webpage: www.duke.edu/~gpc
Research area: supply chain management; incentives in operations management,
electronic commerce
Fangruo Chen
Columbia University
Email: [email protected]
Webpage: http://www.columbia.edu/cu/business/divisions/mgmtsci/chen.html
Research area: supply chain management
Hau L. Lee
Stanford University
Email: [email protected]
Webpage: www-ieem.stanford.edu/faculty/lee/lee.html
Research area: production and operations management, with special interest in
supply chain management, global logistics and distribution systems, inventory
management, information systems and logistics restructuring, manufacturing and
distribution interface, and manufacturing strategy.
Paul H. Zipkin
Duke University
Email: [email protected]
Webpage: http://faculty.fuqua.duke.edu/%7Ezipkin/bio/index.htm
Research area: operations management, inventory management, supply-chain
management and analysis
Key papers
Lee H.L., Padmanabhan V., and Whang S. “Information distortion in a supply chain: The
bullwhip effect.” Management Science, April 1997, Vol. 43, Iss. 4; pg. 546, 13 pgs.
A series of companies in a supply chain is considered, each of who orders from its
immediate upstream member. In this setting, inbound orders from a downstream member
serve as a valuable informational input to upstream production and inventory decisions. It
is claimed that the information transferred in the form of orders tends to be distorted and
can misguide upstream members in their inventory and production decisions. In
particular, the variance of orders may be larger than that of sales, and the distortion tends
to increase as one moves upstream - a phenomenon termed the bullwhip effect. Four
sources of the bullwhip effect are analyzed: demand signal processing, rationing game,
order batching, and price variations. Actions that can be taken to mitigate the detrimental
impact of this distortion are also discussed.
56
Cachon G.P., Lariviere M.A. “Capacity choice and allocation: Strategic behavior and
supply chain performance.” Management Science, August 1999, 45, 8, 1091-1109.
A simple supply chain in which a single supplier sells to several downstream retailers is
considered. The supplier has limited capacity, and retailers are privately informed of their
optimal stocking levels. If retailer orders exceed available capacity, the supplier allocates
capacity using a publicly known allocation mechanism, a mapping from retailer orders to
capacity assignments. It is shown that a broad class of mechanisms is prone to
manipulation; retailers will order more than they need to gain a more favorable
allocation. Another class of mechanisms induces the retailers to order exactly their needs,
thereby revealing their private information. However, there does not exist a truthinducing mechanism that maximizes total retailer profits. The supplier's capacity choice
is also considered. It is shown that a manipulable mechanism may lead the supplier to
choose a higher level of capacity than one would under a truth-inducing mechanism.
Nevertheless, one's choice will appear excessively restrictive relative to the prevailing
distribution of orders.
Cachon, G.P. “Managing supply chain demand variability with scheduled ordering
policies.” Management Science, June 1999, Vol. 45, 6, 843-857.
Supply chain demand variability is studied in a model with one supplier and N retailers
that face stochastic demand. Retailers implement scheduled ordering policies: Orders
occur at fixed intervals and are equal to some multiple of a fixed batch size. A method is
presented that exactly evaluates costs. Previous research demonstrates that the supplier's
demand variance declines as the retailers' order intervals are balanced, i.e., the same
number of retailers order each period. It is shown that the supplier's demand variance will
(generally) decline as the retailers' order interval is lengthened or as their batch size is
increased. Lower supplier demand variance can certainly lead to lower inventory at the
supplier. It is found that reducing supplier demand variance with scheduled ordering
policies can also lower total supply chain costs.
Chen F. “Decentralized supply chains subject to information delays.” Management
Science, August 1999, Vol. 45, Iss. 8, 1076-1091.
A supply chain whose members are divisions of the same firm are considered. The
divisions are managed by different individuals with only local inventory information.
Both the material and information flows in the supply chain are subject to delays. Under
the assumption that the division managers share a common goal to optimize the overall
performance of the supply chain, the optimal decision rules for the divisions are
characterized. The team solution reveals the role of information leadtimes in determining
the optimal replenishment strategies. It is shown that the owner of the firm can manage
the divisions as cost centers without compromising the systemwide performance. This is
achieved by using an incentive-compatible measurement scheme based on accounting
inventory levels. The impact of irrational behavior on supply chain performance is
investigated. It is important for the upstream members of the supply chain to have access
to accurate customer demand information.
Gavirneni S., Kapuscinski R., and Tayur S. "Value of information of capacitated supply
chains.” Management Science, January 1999, Vol. 45, Iss. 1; pg. 16, 9 pgs.
57
Information flow is incorporated between a supplier and a retailer in a two-echelon model
that captures the capacitated setting of a typical supply chain. Three situations are
considered: 1. A traditional model where there is no information to the supplier prior to a
demand to him except for past data, 2. The supplier knows the (s, S) policy used by the
retailer as well as the end-item demand distribution, and 3. The supplier has full
information about the state of the retailer. Order up-to policies continue to be optimal for
models with information flow for the finite horizon, the infinite horizon discounted and
the infinite horizon average cost cases. Study of these three models enables one to
understand the relationships between capacity, inventory, and information at the supplier
level, as well as how they are affected by the retailer's (S - s) values and end-item demand
distribution. The savings at the supplier due to information flow are estimated and when
information is most beneficial is studied.
58
Systems Analysis and Design
Key Issues
1.Software has become an integral part of world's economy. Software development and
deployment remain labor-intensive and intellectually demanding, requiring the best from
developers who must play a number of roles. There are still problems in the process of
making complex software.
2. Shortening cycle time for software projects with more efficiency.
3.Techniques for reuse of software.
4.New techniques for analysis and design- like UML. Further growth into the object
oriented approach.
Key Researchers
Tom DeMarco
Tom DeMarco is a principal of the Atlantic Systems Guild, a computer
systems think tank with offices in the US, Germany, and Great Britain. He
was the winner of the 1986 Warnier Prize for "lifetime contribution to the
field of computing. His work includes Peopleware: Productive Projects and
Teams and Software State-of-the-Art (with coauthor Tim Lister); Structured Analysis and
System Specification; Controlling Software Projects: Management, Measurement and
Estimation; Why Does Software Cost So Much? and Other Puzzles of the Information
Age; and a ground-breaking training video Productive Teams. He has written more than
100 articles and papers about management and the system development process. From his
early seminal work on structured analysis, to his later contributions in the areas of
software metrics and team building, Mr. DeMarco has established himself as a pioneer
and leader in the software profession. He is a member of the IEEE Software Editorial
Board, and was chosen to serve as guest editor for that journal's May, 1997 Special Issue
on Risk Management. He is a faculty member of Cutter Consortium
Grady Booch
Grady Booch is one of the leading software development methodologists in the
world. Along with Rational colleagues Ivar Jacobson and Jim Rumbaugh,
Grady developed the Unified Modeling Language (UML), the industrystandard language for specifying, visualizing, constructing, and documenting
the artifacts of software systems. The UML was officially adopted as a standard by the
Object Management Group (OMG) in 1997. His work centers primarily around complex
software systems. Booch is the author of four books, including "Object-Oriented Analysis
and Design," and "Object Solutions: Managing the Object-Oriented Project." He is a
member of AAAS, IEEE, and CPSR, and is both an ACM Fellow and Rational Fellow.
Currently he is the chief scientist at Rational Software.
59
Michael Fagan
During his development career, Michael created the inspection process for use
on his own projects. He created the Fagan Defect-Free Process, incorporating
Formal Process Definition, and reinforcing the Continuous Process
Improvement aspect of the Inspection Process. Using the inspection method, he
was also able to use its metrics to monitor projects and keep them on track. The
methodology developed by Michael Fagan is credited with dramatically reducing the
number of defects in software and hardware products, increasing the feature content per
release, shortening cycle time, increasing customer satisfaction, improving development
processes, accelerating SEI/CMM maturity in organizations, and significantly reducing
costs! He was the first software senior technical staff member in IBM's T.J. Watson
Research Laboratory; a member of the Corporate Technology Staff; and, one of the
founder members of the IBM Quality Institute. After creating the Inspection Process in
1972, he continued refining the methodology, incorporating Formal Process Definition,
and reinforcing the Continuous Process Improvement aspect of the Fagan Inspection
Process. Since 1989, when he formed Michael Fagan Associates, he has continued to
refine the methodology and has also found ways to help facilitate its very rapid
implementation in more than 60 organizations. From 1983 to 1985, Michael Fagan was a
Visiting Professor in the Department of Computer Science at the University of Maryland.
Michael Fagan Associates in located in Palo Alto, California.
Roger S. Pressman
Roger S. Pressman is an internationally recognized consultant and author in
software engineering. For over 25 years, he has worked as a software
engineer, manager, professor, author, and consultant, focusing on software
engineering issues. Dr. Pressman specializes in helping companies establish effective
software engineering practices. He is the developer of Process Advisor, the industry's
first self-directed software process improvement product, and Essential Software
Engineering, a comprehensive video curriculum. Dr. Pressman is the president of R.S.
Pressman and Associates. Dr. Pressman is the author of six books and many technical and
management articles. His book Software Engineering: A Practitioner's Approach, is the
world's most widely used software engineering textbook. He is also on the Editorial
Board of IEEE Software and is Series Advisor for the McGraw-Hill Systems Design and
Implementation Series. He is a member of the IEEE, ACM, and Tau Beta Pi.
Watts S. Humphrey
Watts S. Humphrey founded the Software Process Program of the Software
Engineering Institute (SEI) at Carnegie Mellon University. He is a Fellow of
the Institute and is a research scientist on its staff. His publications include
many technical papers and seven books. His most recent books are "Managing the
Software Process" (1989), "A Discipline for Software Engineering" (1995), "Managing
Technical People" (1996), "Introduction to the Personal Software Process" (1997), and
"Introduction to the Team Software Process" (2000). Humphrey was responsible for
developing improved software engineering process methods. He has continued to work
closely with software engineers in industry and government, helping them to implement
these improved methods. Before joining the SEI, Humphrey was with IBM for 27 years
60
in various technical and management positions. He is a Fellow of the SEI and the IEEE,
a member of the ACM, a past member of the Malcolm Baldridge national Quality Award
Board of Examiners, and a holder of five issued U.S. patents. He lives in Sarasota
Florida.
Edward Yourdon
Ed has worked in the computer industry for 36 years, beginning when Digital
Equipment Corporation innocently risked the downfall of Western civilization
by hiring him as a starry-eyed undergraduate student in 1964 to write the
FORTRAN math library for the PDP-5 and the assembler for the popular
PDP-8 minicomputer. During his career, he has worked on over 25 different mainframe
computers, and was involved in a number of pioneering computer technologies such as
time-sharing operating systems and virtual memory systems. He was a co-developer of
the Yourdon/Whitehead method of object-oriented analysis/design and the popular
Coad/Yourdon OO methodology. Ed is the author of over 250 technical articles; he has
also authored or coauthored 26 computer books since 1967.
Key Papers/Books
DeMarco, T. (1979). Structured Analysis and System Specification. Prentice-Hall.
This classic book of tools and methods for the analyst brings order and precision to the
specification process as it provides guidance and development of a structured
specification. Covers functional decomposition; data dictionary; process specification;
system modeling; structured analysis for a future system.
Pressman, R. S. (1997). Software Engineering: A Practitioner's Approach. McGraw-Hill.
This book explains all the important topics in software engineering. It is the most widely
used software engineering textbook in the world.
Yourdon, E., and Constantine, L. (1979). Structured Design. Prentice-Hall.
Grady Booch: Object-Oriented Development. TSE 12(2): 211-221 (1986)
According to the author, functional development methods suffer from several
fundamental limitations: they do not effectively address data abstraction and information
hiding, they are generally inadequate for problem domains with natural concurrency and
they are often not responsive to changes in the problem space.
Rick DeNatale, Grady Booch, Peter Coad, Dave A. Thomas, John Tibbets: The Role of
Methods and CASE in OO Development (Panel). OOPSLA 1992: 145
Barry W. Boehm, Tom DeMarco: Guest Editors' Introduction: Software Risk
Management. IEEE Software 14(3): 17-19 (1997)
Tom DeMarco: The Role of Software Development Methodologies: Past, Present, and
Future. ICSE 1996: 2-4
61
Dennis J. Frailey, "Reducing Cycle Time," Software Development, August 2000
According to this article the "cycle time" delays are caused by three fundamental
problems: variability; overly complex processes; and bottlenecks and constraints. The
author goes on to say that "a more fundamental symptom of cycle-time problems is
rework. The more you do things over, the more [work in process] you'll have, which
means you add cost and introduce delays.
Michael E. Fagan: Design and Code Inspections to Reduce Errors in Program
Development. IBM Systems Journal 38(2/3): 258-287 (1999)
Michael E. Fagan: Design and Code Inspections to Reduce Errors in Program
Development. IBM Systems Journal 15(3): 182-211 (1976)
Michael E. Fagan: Advances in Software Inspections. TSE 12(7): 744-751 (1986)
62
Telecommunication
Key Theories and Issues
Today's computer communication networks are based on a technology called packet
switching. Data to be communicated is broken into small chunks that are labeled to show
where they come from and where they are to go. Packets are forwarded from one
computer to another until they arrive at their destination. If any are lost, they are re-sent
by the originator. The recipient acknowledges receipt of packets to eliminate unnecessary
re-transmissions.
ARPANET, a pioneering work in the networking field, was initiated in 1969. Since then
numerous networking research was progressed to solve the problem of linking different
kinds of packet networks together without requiring the users or their computers to know
much about how packets moved from one network to another. A new set of computer
communication protocols, TCP/IP (Transmission Control Protocol and Internet Protocol),
that would allow multiple packet networks to be interconnected in a flexible and dynamic
way were developed to speed up the invention of what was later known as Internet. By
the mid-1980s there was sufficient interest in the use of Internet for business
implementation. An experimental electronic mail relay was built and put into operation in
1989 and its commercial use has exploded. The Internet has been experiencing
exponential growth in the number of networks, number of hosts, and volume of traffic.
One of the major forces behind the exponential growth of the Internet is a variety of new
capabilities in the network -- particularly directory, indexing, and searching services that
help users discover information in the vast sea of the Internet. Many of these services
have started as university research efforts and evolved into businesses. The World Wide
Web was first used in experimental form in 1989, and researchers developed a graphical
browser for the Web which, combined with hypertext, started a new telecommunication
era.
Future Work
It is risky to predict the future of something as dynamic as the Internet. It seems safe to
state that there will be a continuing explosion of new services. There is every reason to
believe that the Internet will transform education, business, government, and personal
activities in ways we cannot fully fathom. The main challenge would come from how to
predict the future networking trend and catch up with the rapid technical evolution while
there is almost no clue to predict for the future.
Key Researchers
Robert E. Kahn
(http://www.cnri.reston.va.us/bios/kahn.html)
Robert E. Kahn is president of the Corporation for National Research Initiatives (CNRI).
He worked at Bell Laboratories, and taught at MIT. He later joined Bolt Beranek and
63
Newman, DARPA. Dr. Kahn conceived the idea of open-architecture networking. He is a
co-inventor of the TCP/IP protocols and was responsible for originating DARPA's
Internet Program. Dr. Kahn also coined the term National Information Infrastructure
(NII) in the mid 1980s, widely known as the Information Super highway.
In his recent work, Dr. Kahn has been developing the concept of a digital object
infrastructure as a key middleware component of the NII. This notion is providing a
framework for interoperability of heterogeneous information systems and is being used in
several applications. He is a co-inventor of Knowbot programs, mobile software agents in
the network environment.
Dr. Kahn is a member of the National Academy of Engineering, a Fellow of the IEEE, a
Fellow of AAAI. He is also a member of the President's Information Technology
Advisory Committee. He is a recipient of numerous awards by his outstanding work.
Vinton G. Cerf ( http://www.stupi.se/Internauts/htmls/Vint-Cerf.html )
Vinton Cerf is senior Vice president of data architecture for MCI's Data and Information
Services Division, a unit of MCI Business Markets. Cerf recently was vice president of
the Corporation for National Research Initiatives (CNRI), where he conducted national
research efforts on information infrastructure technologies. Cerf co-developed the
computer networking protocol, TCP/IP, widely used in the industry and for
communications, and known collectively as the Internet.
From 1982 to 1986, Cerf was vice president of MCI Digital Information. He played a
major role in sponsoring the development of Internet-related data packet technologies.
Cerf is a fellow of the IEEE, ACM and AAAS, and the recipient of numerous awards and
commendations in connection with his work on the Internet. He also has served as
president of the Internet Society since 1992.
Ted Nelson
(http://www.sfc.keio.ac.jp/~ted)
Ted Nelson is currently a Visiting Professor of Environmental Information, Keio
University, Japan. He is best known for coining terms "hypertext" and "hypermedia,"
1963 (first published 1965), and as founder and pursuer of Project Xanadu, the name for
Ted Nelson's hypertext work since 1960.
Ted Nelson foresaw long ago the use of hypertext on a world-wide network. The
structures he and his group designed during the 1960s through 1980s were to make it
possible to annotate and reuse electronic documents, as well as create a new zone of
copyright. During the past four years in Japan, aided by colleagues, Nelson has been
redefining a component Xanadu for the new Internet environment, unpacking the one
unified idea of Xanadu into many separately achievable parts.
David Clark
(http://ana-www.lcs.mit.edu/anaweb/clark.html)
David Clark is senior research scientist of MIT Laboratory for Computer Science. He had
worked at Multics, and Arpanet managing the development of the ARPA network
protocols. He was one of the developers of key token ring LAN concepts. He currently
heads the Advanced Network Architecture research group. In the security area, Dr. Clark
developed an information security model that stresses integrity of data.
64
His current research interests are protocols and architectures for very large and very highspeed networks. Specific activities include the development of methods to support realtime traffic in the Internet, and new models of network service to support distributed
information systems.
Dr. Clark is a member of the IEEE and the ACM. He received the ACM SigComm award
and the IEEE Award for his work on the Internet. He chaired the Internet Activities
Board as well as a study committee of the National Academy of Sciences.
Deborah Estrin
(http://lecs.cs.ucla.edu/~estrin/)
Deborah Estrin is currently an Associate Professor of Computer Science Department of
University of Southern California. Dr. Estrin’s work has focused on the design of
network and routing protocols for very large, global, networks. Her current research
interests are in scalable multicast routing protocols, multicast-oriented reservation setup
protocols, inter-domain routing for global internets, adaptive routing to support
multimedia applications, and design tools and techniques for developing scalable network
protocols.
Dr. Estrin is a member of the ACM and AAAS. She has served on several panels for the
NSF, National Academy of Sciences/CSTB, ARPA, and Office of Technology
Assessment. In 1987, she received the National Science Foundation Presidential Young
Investigator Award for her research in network interconnection and security.
Roch Guerin
(http://www.seas.upenn.edu:8080/~guerin/)
Roch Guerin is currently the Alfred Fitler Moore Professor of Telecommunications
Networks in the University of Pennsylvania. After graduating from Caltech, he worked at
the IBM T.J. Watson Research Center.
His current research interests are in the areas of networking and Quality-of-Service, and
in particular the intersection of the above two areas. The issues of his interest include
randomization in QoS routing, advance reservations, and the impact of aggregation on
service guarantees and verification capabilities.
Key Articles
“Compatibility or Chaos in Communications”, Sanders, Ray W.; Cerf, Vinton G.;
Datamation, Barrington; Mar. 1976; Vol. 22, Issue 3.
A conflict is developing in data-communications in transmitting data between the
manufacture’s equipment and other brands. The users are pushing to erase as many major
incompatibilities as possible. Network Standardization would benefit both sides by giving
users more choice of equipment while opening new markets that would be economically
feasible due to resource sharing. Users must have a greater comprehension of networks.
An explanation of networks, access methods, layers of network access protocols, physical
link, and packet-level protocol is presented. Also discussed are the protocols on top of
protocols – link control header, packet header, information field, and control trailer,
graph and diagram.
65
“Information Processing Technology for Emergency Management”, Kahn, Robert E.
Information Society, New York; 1985.
Several information-processing technologies are capable of augmenting human
performance in handling a range of emergency situations. Technological areas that are
particularly important to emergency management are: communications, computers,
machine intelligence, and security. Both conventional and emerging technologies are
important in the area of communication networks. Some of the systems that have proved
useful in enhancing information collection, transmission, and selective processing are:
packet radio networks, satellite network technology, expert planning systems, Interneting,
and machine intelligence. Packet radio and multiple satellite technology, both based on
packet-switching, can make a considerable difference, and computer-based Internetwork
-systems will initially be most useful for communicating messages electronically. To be
effective, information technology must be integrated into daily patterns to make its use
comfortable and familiar.
“The Heart of Connection: Hypermedia Unified by Transclusion”, Nelson, Ted;
Association for Computing Machinery, New York; Aug 1995; Vol. 38, Issue 8.
The development of a system for massive parallel creative work and study is discussed.
The system is intended to be a technical, legal, and commercial basis for a worldwide
populist and participatory electronic literature of freely weaving screen transmedia republishable and quotable without restrictions - to the betterment of human
understanding and freedom of expression and access. The central idea is the concept of
transclusion, or reuse with original context available, through embedded shared
instancing (rather than duplicate bytes). Thus the user may intercompare contexts of what
is re-used, both for personal work and publication. The elements of transclusion are
discussed.
“Intradomain Qos Routing In IP Networks, A Feasibility And Cost/Benefit Analysis”,
Guerin, Roch, IEEE Network, 1999.
Constraint-based routing gradually becomes an essential enabling mechanism for a
variety of emerging network services. In this work the workers build on previous results
on the cost of QoS routing and investigate the performance/cost trade-offs involved in the
operation of a representative QoS routing architecture, elaborate on the constituents of
this cost, and identify the main methods for containing the cost that QoS routing incurs
on routers. The results show that the cost of QoS routing is not excessive and that there
exist operational configurations, which can achieve reasonable performance gains with
only a minimal increase in processing cost when compared to conventional best-effort
routing.
“An Analysis of TCP Processing Overhead”, David Clark; V. Jacobson, J. Romkey; H.
Salwen, IEEE Communications Magazine, June 1989, Vol. 27, No. 6.
The transport layer of the protocol suite, especially in connectionless protocols, has
considerable functionality and is typically executed in software by the host processor at
the end points of the network. It is thus considered a likely source of processing
overhead. However, a preliminary examination has suggested to the authors that other
aspects of networking may be a more serious source of overhead. To test this proposition,
66
a detailed study was made of the Transmission Control Protocol (TCP), the transport
protocol from the Internet protocol suite. In this set of protocols, the functions of
detecting and recovering lost or corrupted packets, flow control, and multiplexing are
performed at the transport level. The results of that study are presented. It is concluded
that TCP is in fact not the source of the overhead often observed in packet processing,
and that it could support very high speeds if properly implemented.
“Controls for Interorganization Networks”, Estrin, Deborah; IEEE Transactions On
Software Engineering, New York; Feb 1987; Vol. SE13, Issue 2.
Interorganization computer networks support person-to-person communication via
various methods. Because of most firms' desire for limited access of resources to
outsiders, interorganization networks (ION) have unique usage-control requirements. A
conceptual model for implementing usage control in IONs is described. Usage control
requirements in networks that cross organization boundaries are discussed. The analysis
indicates that category sets and nondiscretionary control mechanisms can be employed to
isolate strictly internal facilities from ION facilities and distinct IONs from one another.
Attention is then focused on the problem of authentification in IONs -- an essential
component of the proposed control mechanisms.
67
Workflow
Introduction
1. Definition - Workflow
The computerized facilitation or automation of a business process, in whole or part.
Workflow is often associated with Business Process Re-engineering, which is concerned
with the assessment, analysis, modeling, definition and subsequent operational
implementation of the core business processes of an organization (or other business
entity).
2. Definition - Workflow Management System
A system that completely defines, manages and executes “workflows” through the
execution of software whose order of execution is driven by a computer representation of
the workflow logic.
The Evolution of Workflow
The evolution of workflow as a technology has thus encompassed a number of different
product areas.
Image Processing
Document Management
Electronic Mail and Directories
Groupware Applications
Transaction-based Applications
Project Support Software
BPR and Structured System Design Tools
Separation of workflow functionality
Trends
Workflow Automation
Workflow Analysis
Workflow and E-Commerce
Workflow and AI
68
Key People
Christoph Bussler
Oracle Corporation, USA
Email: [email protected]
Webpage: http://www6.informatik.unierlangen.de/history/people/bussler.html
Research areas: Organizational policy management in workflow
management systems, generic workflow models, architecture of highperformance workflow management systems, and mobility aspects of workflow
management
Clarence Ellis
University of Colorado at Boulder
Email: [email protected]
Webpage: http://rintintin.colorado.edu/~skip/
Research areas: Workflow technology, groupware, cognitive science
(group cognition), computer supported cooperative work, object oriented
systems, systems modeling, databases, group user interfaces, and
distributed systems.
Stefan Jablonski
University of Erlangen-Nuernberg, Germany
Email: [email protected]
Webpage: http://www6.informatik.uni-erlangen.de/Staff/jablonski.html
Research areas: Workflow management, business process and enterprise
modeling, systems integration, transaction management, and database
management
Amit P. Sheth
University of Georgia
Email: [email protected]
Webpage: http://lsdis.cs.uga.edu/~amit/
Research areas: Interoperable information systems and enterprise
application integration (esp. workflow management), global information
systems (esp. management of heterogeneous digital media, information brokering, the
logical/semantic view of the web through use of broad variety metadata and ontologies).
J. Leon Zhao
University of Arizona
Email: [email protected]
Webpage: http://shell.bpa.arizona.edu/~lzhao/
Research areas: Development of database and workflow technologies and
their applications in electronic commerce, knowledge management, and
organizational process automation.
69
Key Papers
Dimitrios, Mark Hornick and Amith Sheith An Overview of Workflow Management:
From Process Modeling to Workflow Automation Infrastructure, Distributed and Parallel
Database, 3, 119-153 (1995)
Today's business enterprises must deal with global competition, reduce the cost of doing
business, and rapidly develop new services and products. To address these requirements
enterprises must constantly reconsider and optimize the way they do business and change
their information systems and applications to support evolving business processes.
Workflow technology facilitates these by providing methodologies and software to
support (i) business process modeling to capture business processes as workflow
specifications, (ii) business process reengineering to optimize specified processes, and
(iii) workflow automation to generate workflow implementations from workflow
specifications. This paper provides a high-level overview of the current workflow
management methodologies and software products. In addition, it discusses the
infrastructure technologies that can address the limitations of current commercial
workflow technology and extend the scope and mission of workflow management
systems to support increased workflow automation in complex real-world environments
involving heterogeneous, autonomous, and distributed information systems. In particular,
it discusses how distributed object management and customized transaction management
can support further advances in the commercial state of the art in this area.
2. Akhil Kumar; J Leon Zhao; Dynamic routing and operational controls in workflow
management systems; Management Science, Providence; Feb 1999; 45, 2; 253-273.
Businesses around the world are paying more attention to process management and
process automation to improve organizational efficiency and effectiveness. A general
framework for implementing dynamic routing and operational control mechanisms in
workflow management systems (WMS) is described. The framework consists of three
techniques: workflow control tables, sequence constraints, and event-based workflow
management rules. This approach offers several unique features that are missing in
commercial workflow management systems: 1. It provides more flexibility in process
modeling and control. 2. It permits rework on an ad hoc basis. 3. It handles exceptions to
routing and operational controls. 4. It exploits parallelism to increase system throughput
and response time. Finally, the workflow management techniques are applied to the case
of consumer loan management and compared with other approaches based on static
routing.
3. W.M.P. van der Aalst, The Application of Petri Nets to Workflow Management ,
Department of Mathematics and Computer Science reports, Eindhoven University of
Technology.
Workflow management promises a new solution to an age-old problem: controlling,
monitoring, optimizing and supporting business processes. What is new about workflow
management is the explicit representation of the business process logic which allows for
computerized support. This paper discusses the use of Petri nets in the context of
workflow management. Petri nets are an established tool for modeling and analyzing
processes. On the one hand, Petri nets can be used as a design language for the
70
specification of complex workflows. On the other hand, Petri net theory provides for
powerful analysis techniques which can be used to verify the correctness of workflow
procedures. This paper introduces workflow management as an application domain for
Petri nets, presents state-of-the-art results with respect to the verification of workflows,
and highlights some Petri-net-based workflow tools.
4. Christoph Bussler, Stefan Jablonski; Implementing Agent Coordination for Workflow
Management Systems Using Active Database Systems. RIDE-ADS 1994: 53-59
One crucial function of a workflow management system (WFMS) is to assign tasks to
users who are eligible to carry them out. Except in simple workflow scenarios, roles such
as secretary and manager are not a sufficient basis for determining eligibility.
Additionally, WFMSs are deployed not only in group settings by small companies but
also worldwide by large enterprises. Since local laws and business policies have to be
followed, task assignment policies for the same task generally differ from country to
country and, therefore, must be specified locally. The Policy Resolution Architecture
(PRA) model provides more generality and expressiveness than role models do and at the
same time supports the independent specification of task assignment policies in different
parts of an enterprise. PRA can be used to model arbitrary organization structures and to
define realistic task assignment (eligibility) rules by means of precisely defined
organizational policies. Thus, PRA provides real-world organizations with a precise,
simple means of expressing their complex task assignment policies.
71
Appendix A
Name
Lynda M Applegate
Yannis Bakos
Frank Biocca
Grady Booch
Organization
Harvard University
New York University
Michigan State
University
Gerard P Cachon
Vinton G. Cerf
University of
California, Los Angeles
Massachusetts Institute
of Technology
Oracle Corporation
University of
Pennslvnia
MCI
Fangruo Chen
Columbia University
Hsinchun Chen
University of Arizona
Massachusetts Institute
of Technology
University of
Massachusetts,
Amherst
Georgetown University
Christine L. Borgman
Erik Brynjolfsson
Christoph Bussler
David Clark
W. Bruce Croft
Mary J. Culnan
Thomas Davenport
Tom DeMarco
Peter J. Denning
Jerry DeSanctis
Vinton G. Cerf
Moshe Dror
Clarence Ellis
Deborah Estrin
Michael Fagan
Edward A. Feigenbaum
Marshall Fisher
R. Brent Gallupe
Seymour E. Goodman
Roch Guerin
Watts S. Humphrey
Edward A. Fox
Boston University
George Mason
University
Duke University
MCI
University of Arizona
University of Colorado
at Boulder
University of Southern
California
Stanford University
University of
Pennsylvania
Queens University
Georgia Institute of
Technology
University of
Pennsylvania
Virginia Polytechnic
Institute and State
University
Research Field
E-Commerce
E-Commerce
CMC/HCI/Communication/Visualiz
ation
Systems Analysis and Design
Knowledge Management /
Information Retrieval
Information Economics
Workflow
Operations Research/Supply Chain
Management
Telecommunication
Operations Research/Supply Chain
Management
Artificial Intelligence/Knowledge
Management
Knowledge Management /
Information Retrieval
Telecommunication
Information Retrieval
Social/Ethical/psychological issues
Information Retrieval
Systems Analysis and Design
Computing Policy
Group Support Systems
Telecommunication
Operations Research
Workflow
Telecommunication
Systems Analysis and Design
Artificial Intelligence/Knowledge
Management
Operations Research
Group Support Systems
Computing Policy
Telecommunication
Systems Analysis and Design
Information Retrieval
72
Knowledge Management /
Information Retrieval
Knowledge Management /
Information Retrieval
Stefan Jablonski
Sirkaa L. Jarvenpaa
Ellis Johnson
Karen Sparck Jones
Robert E. Kahn
Sara Kiesler
Won Kim
Robert Kling
Robert Kraut
Charles H. Kriebel
Hau L. Lee
Stuart E. Madnick
Gary Marchionini
John McCarthy
Haim Mendelson
Tridas Mukhopadhyay
Ted Nelson
Theodor Holm Nelson
George Nemhauser
Peter G. Neumann
Jakob Nielsen
Eli M. Noam
Donald Norman
Jay F. Nunamaker, Jr.
University of ErlangenNuernberg, Germany
University of Texas at
Austin
Georgia Institute of
Technology
University of
Cambridge
Corporation for
National Research
Initiatives
Carnegie Mellon
University
Cyber Database
Solutions, Inc.
Indiana University at
Bloomington
Carnegie Mellon
University
Carnegie Mellon
University
University of Stanford
Massachusetts Institute
of Technology
Stanford University
Stanford University
Carnegie Mellon
University
Keio University, Japan
Keio University
Georgia Institute of
Technology
Daniel E. O'Leary
Columbia University
Apple Computer, Inc.
University of Arizona
University of Southern
California
Gary M. Olson
University of Michigan
Judy Olson
University of Michigan
Massachusetts Institute
of Technology
Massachusetts Institute
of Technology
Wanda J. Orlikowski
James B. Orlin
Roger S. Pressman
Sudha Ram
University of Arizona
Workflow
Group Support Systems
Operations Research
Information Retrieval
Telecommunication
Group Support Systems
Social/Ethical/psychological
issues
Database
Social/Ethical/psychological issues
CMC/HCI/Communication/Visualiz
ation
Computing Policy
Information Economics
Operations Research/Supply Chain
Management
Database
Information Retrieval
Artificial Intelligence/Knowledge
Management
E-Commerce
E-Commerce
Telecommunication
Artificial Intelligence/Knowledge
Management
Operations Research
Computing Policy
CMC/HCI/Communication/Visualiz
ation
Computing Policy
Social/Ethical/psychological issues
Group Support Systems
Knowledge Management /
Information Retrieval
Knowledge Management /
Information Retrieval
Group Support Systems
Group Support Systems
Operations Research
Systems Analysis and Design
Database
73
Information Economics
Social/Ethical/psychological
issues
CMC/HCI/Communication/
Visualization
Raj Reddy
Gerard Salton (1927-1995)
Jerome Howard Saltzer
Omar El Sawy
Roger c. Schank
Amit P. Sheth
Ben Shneiderman
Barbara Simons
Herbert A. Simon
Lee Sproull
Sherry Turkle
Douglas R. Vogel
Joseph Walther
Suzie Weisband
Andrew B. Whinston
J. Leon Zhao
Paul H. Zipkin
Vladimir Zwass
Carnegie Mellon
University
Artificial Intelligence/Knowledge
Management
Cornell University
Massachusetts Institute
of Technology
University of Southern
California
Northwestern
University
University of Georgia
Information Retrieval
University of Maryland
Carnegie Mellon
University
New York University
Massachusetts Institute
of Technology
City University of
Hong Kong
Rensselaer Polytechnic
Institute
University of Arizona
University of Texas at
Austin
University of Arizona
Duke University
Fairleigh Dickinson
University
Knowledge Management /
Information Retrieval
Computing Policy
Knowledge Management /
Information Retrieval
Artificial Intelligence/Knowledge
Management
Workflow
CMC/HCI/Communication/Visualiz
ation
Computing Policy
Artificial Intelligence/Knowledge
Management
Social/Ethical/psychological issues
CMC/HCI/Communication/Visualiz
ation
Group Support Systems
CMC/HCI/Communication/Visualiz
ation
CMC/HCI/Communication/Visualiz
ation
E-Commerce
Workflow
Operations Research/Supply Chain
Management
E-Commerce
74
Information Economics