Data Analytics, Strategy, and Business Values
Permanent URI for this collectionhttps://hdl.handle.net/10125/107553
Browse
Recent Submissions
Item type: Item , When Growth Opportunities Meet Cybersecurity Risk: A Topic Modeling Approach(2024-01-03) Frost, Tracie; Tripathi, Muktak; Zhuang, VincentUsing textual analysis to capture firms’ business prospects, this paper examines whether firms with high growth prospects are more vulnerable to cybersecurity risk, whether breaches impact growth firms’ investment cycles, and how growth firms can protect against data breaches. Our findings suggest that firms with high growth prospects are greater targets for data breaches and provide compelling evidence that the particular firm characteristics that are hallmarks of growth firms may open those firms to greater cybersecurity risk. Further, our findings suggest that high growth firms maintain a robust investment cycle, despite experiencing a data breach, consistent with the growth mindset that these firms adopt. Finally, we provide evidence that growth firms with higher IT awareness can better defend themselves from cyber attacks.Item type: Item , Role of Customer Loyalty in the Application of Customer Data within Supply Chains(2024-01-03) Paavola, Lauri; Julkunen, Saara; Gabrielsson, MikaIn this paper, we explore the drivers behind the use of customer data in retail supply chains. While past literature has primarily posited that power and trust among retailers and suppliers is created by the sizes of organizations, further determining how supply chains share and utilize customer data, we seek to extend this understanding. Based on our analysis, we identify end-customer behavior as an important attribute that determines decision-making regarding usage of customer data. The more customer data of individual end-customers is dispersed among retailers – i.e. the less loyal customers are – the more likely it is that the retailers share data with their suppliers. Building on this, our study enhances the current understanding on the sources for power and trust and discovers a new dynamic for why customer data is not always applied throughout the supply chains. It also identifies new aspects to consider for policy makers looking to support the development in the use of data that is highly important for many economies.Item type: Item , Utilizing Machine Learning to Explore the Relationship between Organizational Wireless and Mobile Strategy and Firm Performance: the Moderating Roles of IT Investment and CIO Compensation(2024-01-03) He, Xiaqing; Nerur, Sridhar; Zhang, JieThis study investigates the implications of organizational wireless and mobile strategy on firm performance in the context of publicly traded information technology firms in the United States. Based on the resource-based view, it is hypothesized that information technology investment positively moderates the relationship between wireless and mobile strategy and firm performance. Similarly, chief information officer compensation is expected to strengthen the positive relationship between wireless and mobile strategy and firm performance. To test these hypotheses, topic modeling techniques and ordinary least squares regression are employed to analyze the data. The results support the positive effects of wireless and mobile strategy on firm performance. Additionally, chief information officer compensation significantly improves the performance implications of wireless and mobile strategy. Furthermore, information technology investment strengthens the positive impact of wireless and mobile strategy on firm performance. This study concludes by discussing the theoretical and practical implications of these findings.Item type: Item , Introduction to the Minitrack on Data Analytics, Strategy, and Business Values(2024-01-03) Lim, Jee-Hae; Xu, Tu
