Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

    Raymond Patterson

    Traditionally, IT security investment decisions are made in isolation. However, as firms that compete for customers in an industry are closely interlinked, a macro perspective is needed in analyzing the IT security spending decisions and... more
    Traditionally, IT security investment decisions are made in isolation. However, as firms that compete for customers in an industry are closely interlinked, a macro perspective is needed in analyzing the IT security spending decisions and this is a key contribution of the paper. We introduce the notions of direct- and cross-risk elasticity to describe the customer response to adverse IT security events in the firm and competitor, respectively, thus allowing us to analyze optimal security investment decisions. Both symmetric and asymmetric cases are examined for a duopoly in a continuous-time Markov chain (CTMC) setting. We demonstrate that optimal IT security spending, expected firm profits and willingness of firms to cooperate with competitors to improve security are highly dependent on the nature of customer response to adverse events, especially whether customer response to adverse security events in the competitor increases or decreases firm demand.
    Your personal information is out there. You did not give it out, so how did it get there? Internet websites provide visitors with different levels of interaction, ranging from delivering basic information to providing sophisticated... more
    Your personal information is out there. You did not give it out, so how did it get there? Internet websites provide visitors with different levels of interaction, ranging from delivering basic information to providing sophisticated features and tools such as profile management, interactive visual communication, and of course, advertising. Like many traditional businesses, websites turn to third-party outsourcing to offer these features and tools. Such services include functionality (password and account control, social media integration, video hosting, chat and forum services, payment services, etc.), performance (backup service, security and firewalls, responsiveness tools, etc.) and targeting/advertising (advertising, lead generation, analytics, etc.).
    Grooming has emerged as an active area of research within the operations research and telecommunications fields and concerns the optimization of network transmissions that span multiple distinct transmission channels, protocols, or... more
    Grooming has emerged as an active area of research within the operations research and telecommunications fields and concerns the optimization of network transmissions that span multiple distinct transmission channels, protocols, or technologies. This study explores the meaning of grooming, the technical context in which it can be applied, and example situations. A new taxonomy captures key aspects of grooming problems and is used to summarize over 50 key publications on this important traffic-engineering and optimization problem class.
    ABSTRACT Enterprises must manage their information risk as part of their larger operational risk management program. Managers must choose how to control for such information risk. This article defines the flow risk reduction problem and... more
    ABSTRACT Enterprises must manage their information risk as part of their larger operational risk management program. Managers must choose how to control for such information risk. This article defines the flow risk reduction problem and presents a formal model using a workflow framework. Three different control placement methods are introduced to solve the problem, and a comparative analysis is presented using a robust test set of 162 simulations. One year of simulated attacks is used to validate the quality of the solutions. We find that the math programming control placement method yields substantial improvements in terms of risk reduction and risk reduction on investment when compared to heuristics that would typically be used by managers to solve the problem. The contribution of this research is to provide managers with methods to substantially reduce information and security risks, while obtaining significantly better returns on their security investments. By using a workflow approach to control placement, which guides the manager to examine the entire infrastructure in a holistic manner, this research is unique in that it enables information risk to be examined strategically.
    The Local Area Network (LAN) Implementation Project Life Cycle Model presented in this paper integrates various checklists of LAN specific implementation considerations with the critical success factors (CSFs) associated with the various... more
    The Local Area Network (LAN) Implementation Project Life Cycle Model presented in this paper integrates various checklists of LAN specific implementation considerations with the critical success factors (CSFs) associated with the various stages of the project life cycle. This model addresses the sequence and the timing of various implementation tasks based on the project CSFs over the various implementation life cycle stages. This model provides a superior model for practitioners to implement their local area networks, as it provides focus in addressing the factors critical for success. This model also provides a superior basis for approaching research work in comparison with the current checklists, as it highlights the tasks associated with the CSFs over each phase of the LAN implementation project life cycle.
    ABSTRACT Enterprises must manage their information risk as part of their larger operational risk management program. Managers must choose how to control for such information risk. This article defines the flow risk reduction problem and... more
    ABSTRACT Enterprises must manage their information risk as part of their larger operational risk management program. Managers must choose how to control for such information risk. This article defines the flow risk reduction problem and presents a formal model using a workflow framework. Three different control placement methods are introduced to solve the problem, and a comparative analysis is presented using a robust test set of 162 simulations. One year of simulated attacks is used to validate the quality of the solutions. We find that the math programming control placement method yields substantial improvements in terms of risk reduction and risk reduction on investment when compared to heuristics that would typically be used by managers to solve the problem. The contribution of this research is to provide managers with methods to substantially reduce information and security risks, while obtaining significantly better returns on their security investments. By using a workflow approach to control placement, which guides the manager to examine the entire infrastructure in a holistic manner, this research is unique in that it enables information risk to be examined strategically.
    Research Interests:
    Research Interests:
    Antia, Kersi D. See Hulland, John. Bardhan, Indranil; Whitaker, Jonathan; and Mithas, Sunil. “Information Technology, Production Process Outsourcing, and Manufacturing Plant Performance,” in JMIS, vol. 23, no. 2 (Fall 2006), pp. 13–40.... more
    Antia, Kersi D. See Hulland, John. Bardhan, Indranil; Whitaker, Jonathan; and Mithas, Sunil. “Information Technology, Production Process Outsourcing, and Manufacturing Plant Performance,” in JMIS, vol. 23, no. 2 (Fall 2006), pp. 13–40. Benaroch, Michel; Shah, Sandeep; and Jeffery, Mark. “On the Valuation of Multistage Information Technology Investments Embedding Nested Real Options,” in JMIS, vol. 23, no. 1 (Summer 2006), pp. 239–261. Benbasat, Izak. See Lim, Kai H. ———. See also Wang, Weiquan. Bhattacharjee, Sudip; ...
    Combinatorial optimization problems are by nature very di$cult to solve, and the Capacitated Minimum Spanning Tree problem is one such problem. Much work has been done in the management sciences to develop heuristic solution procedures... more
    Combinatorial optimization problems are by nature very di$cult to solve, and the Capacitated Minimum Spanning Tree problem is one such problem. Much work has been done in the management sciences to develop heuristic solution procedures that suboptimally solve large instances of the Capacitated Minimum Spanning Tree problem in a reasonable amount of time. The Capacitated Minimum Spanning Tree problem is
    It is the purpose of this paper to investigate effects of adding randomization to a memory-based heuristic. The algorithms we propose are applied to the Capacitated Minimum Spanning Tree problem (CMST), and we study the combined effects... more
    It is the purpose of this paper to investigate effects of adding randomization to a memory-based heuristic. The algorithms we propose are applied to the Capacitated Minimum Spanning Tree problem (CMST), and we study the combined effects of simultaneously applying a ...
    Combinatorial optimization problems are by nature very di$cult to solve, and the Capacitated Minimum Spanning Tree problem is one such problem. Much work has been done in the management sciences to develop heuristic solution procedures... more
    Combinatorial optimization problems are by nature very di$cult to solve, and the Capacitated Minimum Spanning Tree problem is one such problem. Much work has been done in the management sciences to develop heuristic solution procedures that suboptimally solve large instances of the Capacitated Minimum Spanning Tree problem in a reasonable amount of time. The Capacitated Minimum Spanning Tree problem is
    Although grooming has been an issue in telecommunications network design since the invention of multiplexing, many are unfamiliar with the term and the topic has received scant attention from the research community. It is the goal of this... more
    Although grooming has been an issue in telecommunications network design since the invention of multiplexing, many are unfamiliar with the term and the topic has received scant attention from the research community. It is the goal of this article to introduce network grooming to the ...
    Alnuaimi, Omar A.; Robert, Lionel P., Jr.; and Maruping, Likoebe M. “Team Size, Dispersion, and Social Loafing in Technology-Supported Teams: A Perspective of the Theory of Moral Disengagement,” in JMIS, vol. 27, no. 1 (Summer 2010), pp.... more
    Alnuaimi, Omar A.; Robert, Lionel P., Jr.; and Maruping, Likoebe M. “Team Size, Dispersion, and Social Loafing in Technology-Supported Teams: A Perspective of the Theory of Moral Disengagement,” in JMIS, vol. 27, no. 1 (Summer 2010), pp. 203–230. Altinkemer, Kemal. See Ozdemir, Zafer D. Altinkemer, Kemal; Ozcelik, Yasin; and Ozdemir, Zafer D. “Productivity and Performance Effects of Business Process Reengineering: A Firm-Level Analysis,” in JMIS, vol. 27, no. 4 (Spring 2011), pp. 129–161. Arazy, Ofer; Nov, Oded; Patterson, Raymond; ...
    Inc. Spinway's services were offered primarily through, and under the name of, large consumer companies such as Yahoo!, KMart, Costco, Spiegel, Barnes & Noble, Ace Hardware, and NBC among others. By early 2001, the free ISP market... more
    Inc. Spinway's services were offered primarily through, and under the name of, large consumer companies such as Yahoo!, KMart, Costco, Spiegel, Barnes & Noble, Ace Hardware, and NBC among others. By early 2001, the free ISP market had been reduced severely, primarily due to the lack of revenues associated with such “free” services. Spinway, founded in 1998, was a major, and perhaps the largest, free ISP in the US with over 6 million customers at its peak. Spinway folded in December of 2000, and the remains of their ...
    Proponents of Customer Relationship Management (CRM) suggest that a firm can develop a value creation relationship, such that an increase in customer value, leads to an increase in firm value (Mithas et al., 2005). The value for the... more
    Proponents of Customer Relationship Management (CRM) suggest that a firm can develop a value creation relationship, such that an increase in customer value, leads to an increase in firm value (Mithas et al., 2005). The value for the customers comes from the provision of goods and services that match their needs. However, the research to date on using e-CRM systems to both foster and monitor this value creation process is somewhat mixed. This chapter proposes to cross-functionally integrate organizational assets with ...
    Abstract: It is the purpose of this paper to investigate effects of adding randomization to a memory-based heuristic. The algorithms we propose are applied to the Capacitated Minimum Spanning Tree problem (CMST), and we study the combined... more
    Abstract: It is the purpose of this paper to investigate effects of adding randomization to a memory-based heuristic. The algorithms we propose are applied to the Capacitated Minimum Spanning Tree problem (CMST), and we study the combined effects of simultaneously applying a memory-based and a randombased heuristic to the CMST. This paper uses the Adaptive Reasoning Technique (ART) and concepts from the greedy randomized adaptive search procedure for solving the CMST. The resulting hybrid ...
    In this paper, we propose a new method for partitioning a graph into an unspecified number of Hamiltonian subgraphs with minimum and maximum size requirements on the subgraphs. We refer to this problem as the cardinality constrained... more
    In this paper, we propose a new method for partitioning a graph into an unspecified number of Hamiltonian subgraphs with minimum and maximum size requirements on the subgraphs. We refer to this problem as the cardinality constrained covering traveling salesman problem (CCC-TSP). Special cases of this problem include the assignment problem and the traveling salesman problem (TSP). This paper proposes a heuristic solution methodology to a general class of problems that is important because by setting the parameters, one can obtain ...
    All too often, the hard work that members of the scholarly community do to support our profession goes unrecognized. For the sixth year, the Editorial Board of Operations Research has decided to reward outstanding service to the... more
    All too often, the hard work that members of the scholarly community do to support our profession goes unrecognized. For the sixth year, the Editorial Board of Operations Research has decided to reward outstanding service to the journal's scholarly mission. Associate editors and referees who did an exceptionally professional job by submitting timely, unbiased, and thoughtful reviews were considered for this award. This award is just a small token of the appreciation for exceptional work performed on behalf of Operations ...
    ABSTRACT This article proposes a solution methodology for the design of a wide area telecommunication network. This study is motivated by the Alberta SuperNet project, which provides broadband Internet access to 422 communities across... more
    ABSTRACT This article proposes a solution methodology for the design of a wide area telecommunication network. This study is motivated by the Alberta SuperNet project, which provides broadband Internet access to 422 communities across Alberta. There are two components to this problem: the network design itself, consisting of selecting which links will be part of the solution and which nodes should house shelters; and the loading problem which consists of determining which signal transport technology should be installed on the selected edges of the network. Mathematical models are described for these two subproblems. A tabu search algorithm heuristic is developed and tested on randomly generated instances and on Alberta SuperNet data.Journal of the Operational Research Society (2008) 59, 1460-1470. doi:10.1057/palgrave.jors.2602479 Published online 12 September 2007
    he theory of incomplete contracts has been used to study the relationship between buyers and suppliers fol- lowing the deployment of modern information technology to facilitate coordination between them. Previous research has sought to... more
    he theory of incomplete contracts has been used to study the relationship between buyers and suppliers fol- lowing the deployment of modern information technology to facilitate coordination between them. Previous research has sought to explain anecdotal evidence from some industries on the recent reduction in the number of suppliers selected to do business with buyers by appealing to relationship-specific costs
    The network design problem with relays (NDPR) is defined on an undirected graph G=(V,E,K), where V={1,…,n} is a vertex set, E={(i,j):i,j∈V,i<j} is an edge set. The set... more
    The network design problem with relays (NDPR) is defined on an undirected graph G=(V,E,K), where V={1,…,n} is a vertex set, E={(i,j):i,j∈V,i<j} is an edge set. The set K={(o(k),d(k))} is a set of communication pairs (or commodities): o(k)∈V and d(k)∈V denote the origin and the destination of the kth commodity, respectively. With each edge (i,j) are associated a cost cij and
    Bora Kolfal, Raymond Patterson, M. Lisa Yeo Dept. of Accounting and Management Information Systems, School of Business, University of Alberta, Edmonton, AB T6G 2R6 {bkolfal, ray.patterson, myeo}@ualberta.ca, ... Traditionally, IT security... more
    Bora Kolfal, Raymond Patterson, M. Lisa Yeo Dept. of Accounting and Management Information Systems, School of Business, University of Alberta, Edmonton, AB T6G 2R6 {bkolfal, ray.patterson, myeo}@ualberta.ca, ... Traditionally, IT security investment decisions are ...

    And 11 more