Background Image
Previous Page  430 / 552 Next Page
Information
Show Menu
Previous Page 430 / 552 Next Page
Page Background

INFORMS Philadelphia – 2015

428

WC04

04-Room 304, Marriott

Business Applications I

Contributed Session

Chair: Ravichandran Narasimhan, Professor, Indian Institute of

Management Ahmedabad, Wing- 02 D, Ahmedabad, Gu, 380015,

India,

nravi@iimahd.ernet.in

1 - Mobile Technology and Emergency Response

Hongwei Du, Professor, California State University, 25800 Carlos

Bee Blvd, Hayward, CA, 94542, United States of America,

hongwei.du@csueastbay.edu,

Jiming Wu

Emergency situations happen every day that requires response. We explore how

mobile technology can be part of an effective strategy to manage emergency

situations and the risks posed by natural hazards. This is achieved through mobile

applications and technology on an individual and community level by taking

advantage of the portability, ease of use, and popularity/prevalence of

smartphones and tablets. The role of mobile technology in crises is critically

explored in three cases studies.

2 - The Information Societies of India and China: Multivariate and

Geospatial Comparison

Avijit Sarkar, Associate Profesor, University of Redlands, 1200 E.

Colton Avenue, Redlands, CA, 92373, United States of America,

avijit_sarkar@redlands.edu

, James Pick

We present comparative analysis of the information societies of the provinces of

China and the states of India. The digital divide in both nations is analyzed and

contrasted using multivariate and geostatistical methods. The roles of social capital

and societal openness in fostering technology adoption and diffusion are

discussed. Policy recommendations are presented and implications contextualized

in relation to findings on telecommunications landscape in both countries.

3 - A Constraint Programming Approach for the Team Orienteering

Problem with Time Windows

Ridvan Gedik, Assistant Professor, University of New Haven,

300 Boston Post Rd, West Haven, CT, 06516,

United States of America,

rgedik@newhaven.edu

,

Ashlea Milburn, Chase Rainwater, Emre Kirac

We discuss how to formulate and solve the NP-hard team orienteering problem

with time windows (TOPTW) in constraint programming (CP) context by using

interval variables, global constraints and domain filtering algorithms. The

proposed CP model with a customized branching strategy obtains three new best

solutions and proves the optimality of the three best-known solutions for the

benchmark problem instances.

4 - A Canonical Model to Support the Mid Day Meal Supply Chain

Ravichandran Narasimhan, Professor, Indian Institute of

Management Ahmedabad, Wing- 02 D, Ahmedabad, Gu, 380015,

India,

nravi@iimahd.ernet.in

In the indian context providing Mid day meal at the primary and secondary

schools is increases the enrolment and attendance. Several states having varying

degree of success in implementing this. Based on the ground realities we propose

a simple model to implement this scheme and discuss the implication to manage

it.

WC05

05-Room 305, Marriott

Capitalizing on Social Media

Cluster: Social Media Analytics

Invited Session

Chair: Chris Smith, TRAC-MTRY, 28 Lupin Lane, Carmel Valley, CA,

93924, United States of America,

cmsmith1@nps.edu

1 - Understanding Users’ Switching Among Different Kinds of

Social Media

Xiongfei Cao, USTC, Anhui province, Hefei City, Hefei, China,

caoxf312@126.com

Investigating users’ switching between different kinds of social media is important

because it is closely related to the survival of technologies. Based on the

push–pull–mooring framework, this study investigates social media users’

switching behavior and mechanism. The research contents include: identify the

factors affecting users’ switching among different kinds of social media; elaborate

the mechanism of users’ switching decision.

2 - A Hawkes Process Based Dynamic Trip Attraction Model using

Open Location Based Social Network Data

Wangsu Hu, Rutgers, the State University of New Jersey, CoRE

736, 96 Frelinghuysen Road, Piscataway, NJ, 08854,

United States of America,

nicholas.hu@rutgers.edu

, Peter J. Jin

Location based social network (LBSN) services, such as Foursquare and Geo-

tagged Twitter, allow users to “check in” to their arriving places of interests. In the

proposed research, the public Foursquare check-in data published on Twitter are

used. A Hawkes process based model is proposed to formulate both the actual trip

arrival and LBSN checkins through a dynamic sensing and activity state transition

model. The model is validated with planning data from the City of Austin Texas.

3 - Social Media and the ISIL Narrative

Rob Schroeder, Naval Postgraduate School, 526 Union St.,

Monterey, CA, 93940, United States of America,

rcschroe@nps.edu

, Sean Everton, Daniel Cunningham

The Islamic State of Iraq and Syria (ISIS) has attracted the world’s attention and

much of its wrath, primarily because of its rapid expansion in Iraq and Syria, its

brutal treatment of religious minorities, and its beheadings of hostages from

Western countries. At this point, it is unclear whether the group represents a

global or a sectarian form of jihadism. Is it similar to al-Qaeda, which seeks to

target the far enemy, or is it more sectarian in that it focuses on targeting what it

perceives to be the near enemies of Islam? In this paper we address this debate by

examining ISIS’s online presence on the social media platform, Twitter, which

serves as a forum for supporters to post and receive messages, images, videos, and

links to websites to and from a wide-audience. The speed at which users can

transmit and receive information via Twitter suggests that an analysis of ISIS-

related user accounts and the key themes and concepts they disseminate can

contribute to a better understanding of the group’s overall narrative. We examine

ISIS’s online presence by extracting from Twitter the semantic networks of its

most influential users. We find that a shift may be occurring in the ISIS narrative,

from one that focuses on the near enemy to one that focuses on the far enemy.

Ironically, this shift may have resulted from the actions of the U.S. and its

Western allies.

WC06

06-Room 306, Marriott

Financial Institutions

Sponsor: Financial Services

Sponsored Session

Chair: Gustavo Schwenkler, Assistant Professor, Boston University,

Questrom School of Business, 595 Commonwealth Ave, Boston, MA,

02215, United States of America,

gas@bu.edu

1 - Asset Management Contracts and Equilibrium Prices

Andrea Buffa, Boston University, Questrom School of Business,

Boston, United States of America,

buffa@bu.edu

,

Dimitri Vayanos, Paul Woolley

We study the joint determination of fund managers’ contracts and asset prices.

Because of agency frictions, investors make managers’ fees more sensitive to

performance and benchmark performance against a market index. This

exacerbates price distortions and raises the volatility of overvalued assets. Because

trading against overvaluation is riskier than trading against undervaluation,

agency frictions bias the aggregate market upwards, and can generate a negative

risk-return relationship.

2 - Matching Capital and Labor

Jules Van Binsbergen, University of Pennsylvania,

The Wharton School, Philadelphia, United States of America,

julesv@wharton.upenn.edu

, Jonathan Berk, Binying Liu

We establish an important role for firms by studying capital reallocation decisions

of mutual fund firms. At least 30% of the value mutual fund managers add can

be attributed to the firm’s role in efficiently allocating capital amongst its fund

managers. We find no evidence of a similar effect when a firm hires managers

from another firm. We conclude that an important reason why firms exist is the

private information that derives from the firm’s ability to assess the skill of its

employees.

3 - The Systemic Effects of Benchmarking

Gustavo Schwenkler, Assistant Professor, Boston University,

Questrom School of Business, 595 Commonwealth Ave, Boston,

MA, 02215, United States of America,

gas@bu.edu,

Diogo Duarte,

Keith Lee

We show that pressure to beat a benchmark may induce institutional trading

behavior that exposes retail investors to tail risk. In our model, institutions are

different from a retail investor because they derive higher utility when their

benchmark outperforms. This forces institutions to take on leverage to overinvest

in the benchmark. Institutions execute fire sales when the benchmark

experiences shocks. This behavior increases volatility, raising the tail risk exposure

of the retail investor.

WC04