Informs Annual Meeting 2017
TD46
INFORMS Houston – 2017
3 - Pricing in Remanufacturing Operations Akshay Mutha, Pennsylvania State University, Smeal College of Business, 454 Business Building, University Park, PA, 16802, United States, axm536@psu.edu, Saurabh Bansal, V. Daniel R. Guide We consider a firm that can remanufacture products after the demand is realized. We analyze the effect of postponing remanufacturing operations on the pricing decisions of a firm. We show the application of our model using industry data. 4 - Optimal Core Pricing and Financing Strategies at Different Stages for Remanufacturing Products under Different Quality Levels Qianru Li, Southeast University of China, Nanjing, China, 230169156@seu.edu.cn, Weida Chen This paper studies an acquisition pricing and financing problem in the payback period or production period in a remanufacturing system under independently uncertain demand and capital constraints, where the remanufacturer acquires and produces high- and low-quality cores in a single period setting. The acquisition pricing is viewed as a convex optimization problem, which is formulated by a nonlinear programming model. Finally, numerical experiments are conducted to show that through some key parameters, the optimal decisions can be determined to improve profits of the remanufacturer. 5 - A Two Stage Stochastic Programming Approach for Capacity and Inventory Planning for A Manufacturing Remanufacturing System K. Nageswara Reddy, Research Scholar, Indian Institute of Technology Kharagpur, Academic Area, Kharagpur, West Bengal, 721302, India, knreddy@iitkgp.ac.in, Akhilesh Kumar In this paper, we developed a two-stage stochastic model to optimize capacity and inventory decisions jointly while considering demand, supply and yield uncertainties. We have considered a scenario where new and remanufactured products don’t compete with each other and sold in primary and secondary markets respectively. 360E Teaching Project Management 1 Invited: Project Management and Scheduling Invited Session Chair: Nicholas G. Hall, Ohio State University, Columbus, OH, 43210- 1144, United States, hall.33@osu.edu 1 - Design of a Graduate Business Elective in Project Management Nicholas G.Hall, Ohio State University, 658 Fisher Hall, 2100 Neil Avenue, Columbus, OH, 43210-1144, United States, hall.33@osu.edu This presentation describes in detail the development of a graduate business elective course in project management. Among the components discussed are: lecture content, online simulations, integration of guest speakers, in-class games and exercises, business cases, case reports and presentations, and class participation. Course objectives and learning outcomes are also discussed. 2 - Teaching Project Management’s Four Letter Word: Risk TD46 Arguably, the most important concept in project management is risk; studies have shown that risk management is a project manager’s most important responsibility. In this talk, we discuss ways to teach PM risk management, including the management of a complex project that operates under the threat of a possible disruptive event that will stop all work on the project although overhead/indirect and possible penalty costs will continue to accrue. We describe a short case that illustrates these concepts and relates risk management to standard PM time-cost trade-offs. 3 - Web-based Applications and Games in a Quant Project Management Course Rainer Kolisch, Technical University of Munich, Arcisst 21, Munich, 80333, Germany, rainer.kolisch@tum.de I have been teaching an undergraduate course in project management using operations research models and methods for several years. Recently I introduced the web-based applications RESCON and Project Management Team Builder (PTB) as well as the Marshmallow Game into the course. I will be sharing my experience with the course, its new elements and their alignment with quantitative topics. Theodore D. Klastorin, University of Washington, ISOM Department, Box 353226, Seattle, WA, 98195-3226, United States, tedk@u.washington.edu, Gary Mitchell
4 - Teaching Agile Project Management Enno Siemsen, University of Wisconsin-Madison, Wisconsin School of Business, 975 University Avenue, Madison, WI, 53706, United States, esiemsen@wisc.edu Agile project management has become more prevalent in practice; yet it is not clear how to effectively teach agile project management in the classroom. In this session, I will report on an exercise using Legos that helps students understand the differences between traditional and agile project management.
TD47
360F Risk Management and Cybersecurity Sponsored: EBusiness Sponsored Session Chair: Jingguo Wang, PhD, The University of Texas at Arlington, Arlington, TX, 76019, United States, jwang@uta.edu 1 - Using Machine Learning to Improve Phishing Detection Training Zhe Shan, Univeristy of Cincinnati, shanze@ucmail.uc.edu, Andrew Harrison Fraudulent phishing attacks cost firms and consumers billions of dollars annually. Despite the widespread use of automated classification systems developed to stop phishing attacks, phishing has evolved and continues to pose threats to people and organizations. To fight these dynamic malicious behaviors, researchers have called for better integration of behavioral factors into antiphishing efforts. Our research is motivated to combine the insights gleaned through automated detection systems with behavioral training methods to improve people’s abilities to detect deception. 2 - Information Security Investment with Externalities and Heterogeneous Firms – Theory and Government Policies Jie Zhang, University of Texas at Arlington, Arlington, TX, United States, jie.zhang2@mavs.uta.edu, Kay-Yut Chen, Jingguo Wang How to ensure business entities spend enough effort to protect their information assets has been a challenge for regulators. In this paper, we investigate how externalities and firm heterogeneity impact firms’ level of information security investment . Consistent with prior studies and practical observations, our results indicate that firms tend to under-invest if they make independent, self-interested decisions without any government interventions. We explore two possible governmental policies such as mandatory security investment standard and subsidies that can help alleviate the under-investment problem. 3 - Evolution of Intellectual Structure of Cybersecurity within the Last 25 Years Rahul Dwivedi, PhD Student, University of Texas, 701 S Nedderman Drive, Arlington, TX, 76019, United States, rahul.dwivedi@mavs.uta.edu, Sridhar P.Nerur, Jingguo Wang Cybersecurity is an area of predominant research both for academicians and practitioners. With organizations scrambling to keep up with growing cybersecurity concerns, we see a tremendous growth in the number of articles published in this area. The purpose of this research is to examine the conceptual foundations of the field of cybersecurity based on detailed analysis of research articles published within the last 25 years (1992 - 2015). Using a combination of citation analysis and text analysis techniques, our study aims to identify the most discussed topics, their relationships and evolution over time. 4 - Multilateral Contracts in Information Security Outsourcing Ming Zhao, University of Houston, 334 Melcher Hall 290F, C.T. Bauer College of Business, Houston, TX, 77204, United States, mzhao@bauer.uh.edu We present a comprehensive investigation of multilateral contracts, and analyze the influence of externalities and breach probabilities on contingent payments. The results show that a normalized externality, the ratio between a firm’s externality and its investment efficiency, dictates the levels of contingent payments in multilateral contracts. 5 - Bringing Cyberinsurance and Managed Security Services to ISPS: A Game Theoretic Analysis Yun-Sik Choi, University of Texas at Austine, Austin, TX, United States, yunsik@cs.utexas.edu, Jin Hyuk Choi, Gene Moo Lee, Andrew B.Whinston We propose a new business model for Internet Service Providers (ISPs), which providing managed security service and cyberinsurance in addition to the traditional Internet service. We develop a dynamic game model to build a theoretical foundation of this business model. The Bayesian Nash equilibrium of the game characterizes the strategic interaction between an attacker and a defender. The analysis of the model implies that the defender’s role of updating suspicion level and blocking suspicious users are crucial as the attacker’s capacity increases. These observations support our claim that the ISPs are in the suitable position to provide managed security service and cyberinsurance.
392
Made with FlippingBook flipbook maker