scispace - formally typeset
Search or ask a question
Author

Nir Kshetri

Bio: Nir Kshetri is an academic researcher from University of North Carolina at Greensboro. The author has contributed to research in topics: Computer science & Cybercrime. The author has an hindex of 43, co-authored 269 publications receiving 6817 citations. Previous affiliations of Nir Kshetri include University of North Carolina at Chapel Hill.


Papers
More filters
Journal ArticleDOI
TL;DR: This paper examines how blockchain is likely to affect key supply chain management objectives such as cost, quality, speed, dependability, risk reduction, sustainability and flexibility and illustrates the various mechanisms by which blockchain help achieve the above supply chain objectives.

1,076 citations

Journal ArticleDOI
TL;DR: It is argued that blockchain’s decentralized nature is likely to result in a low susceptibility to manipulation and forgery by malicious participants, and could be superior to the current IoT ecosystem, which relies mainly on centralized cloud servers.
Abstract: This column evaluates blockchain’s roles in strengthening security in the Internet of Things (IoT). Key underlying mechanisms related to the blockchain–IoT security nexus are covered. From a security standpoint, the article highlights how blockchain-based solutions could be, in many aspects, superior to the current IoT ecosystem, which relies mainly on centralized cloud servers. Using practical applications and real-world examples, the article argues that blockchain’s decentralized nature is likely to result in a low susceptibility to manipulation and forgery by malicious participants. Special consideration is given to how blockchain-based identity and access management systems can address some of the key challenges associated with IoT security. The column provides a detailed analysis and description of blockchain’s roles in tracking the sources of insecurity in supply chains related to IoT devices. Using blockchain, it is also possible to contain an IoT security breach in a targeted way after it is discovered. The column also discusses and evaluates initiatives of organizations, interorganizational networks, and industries on the frontlines of blockchain.

659 citations

Journal ArticleDOI
TL;DR: In this paper, an empirical study was conducted to identify the factors that impact SMEs' involvement with the Internet, and the results suggest that specific factors contribute to the SME's involvement with Internet, such as prior technology use and customer service subscale of perceived competitive pressure influence both stages of Internet adoption.
Abstract: The Internet can extend market reach and operational efficiency of small and medium enterprises (SMEs) and enhance their contributions to the U.S. economy. This paper reports an empirical study conducted to identify the factors that impact SMEs' involvement with the Internet. Internal and external variables such as firm size, self-efficacy, prior technology use, etc. are used to predict the level of Internet involvement. This involvement is examined in terms of ownership of a web site (adoption) and use of the Internet for selling purposes (routinization). Logistic regression is used to examine the relationships between internal and external factors and SMEs' involvement with the Internet. The results suggest that specific factors contribute to the SMEs' involvement with the Internet — prior technology use and the customer service subscale of perceived competitive pressure influence both stages of Internet adoption. Moreover, the relative importance of some of these predictor variables decreases as the level of Internet involvement increases. Past media use does not explain SME behavior — in terms of adoption or routinization. These findings can be used to develop strategies to build SME involvement with the Internet.

453 citations

Journal ArticleDOI
TL;DR: It is argued that blockchain's decentralized feature is likely to result in a low susceptibility to manipulation and forgery by malicious participants, and public policy efforts directed at protecting privacy using blockchain should focus on providing training to key stakeholders and increasing investment in this technology.

430 citations

Journal ArticleDOI
TL;DR: Three categories of feedback systems are used-economic, sociopolitical and cognitive-to offer a simple model of e-commerce barriers in the developing world and to identify clear contexts and attendant mechanism.

298 citations


Cited by
More filters
Journal Article
TL;DR: The continuing convergence of the digital marketing and sales funnels has created a strategic continuum from digital lead generation to digital sales, which identifies the current composition of this digital continuum while providing opportunities to evaluate sales and marketing digital strategies.
Abstract: MKT 6009 Marketing Internship (0 semester credit hours) Student gains experience and improves skills through appropriate developmental work assignments in a real business environment. Student must identify and submit specific business learning objectives at the beginning of the semester. The student must demonstrate exposure to the managerial perspective via involvement or observation. At semester end, student prepares an oral or poster presentation, or a written paper reflecting on the work experience. Student performance is evaluated by the work supervisor. Pass/Fail only. Prerequisites: (MAS 6102 or MBA major) and department consent required. (0-0) S MKT 6244 Digital Marketing Strategy (2 semester credit hours) Executive Education Course. The course explores three distinct areas within marketing and sales namely, digital marketing, traditional sales prospecting, and executive sales organization and strategy. The continuing convergence of the digital marketing and sales funnels has created a strategic continuum from digital lead generation to digital sales. The course identifies the current composition of this digital continuum while providing opportunities to evaluate sales and marketing digital strategies. Prerequisites: MKT 6301 and instructor consent required. (2-0) Y MKT 6301 (SYSM 6318) Marketing Management (3 semester credit hours) Overview of marketing management methods, principles and concepts including product, pricing, promotion and distribution decisions as well as segmentation, targeting and positioning. (3-0) S MKT 6309 Marketing Data Analysis and Research (3 semester credit hours) Methods employed in market research and data analysis to understand consumer behavior, customer journeys, and markets so as to enable better decision-making. Topics include understanding different sources of data, survey design, experiments, and sampling plans. The course will cover the techniques used for market sizing estimation and forecasting. In addition, the course will cover the foundational concepts and techniques used in data visualization and \"story-telling\" for clients and management. Corequisites: MKT 6301 and OPRE 6301. (3-0) Y MKT 6310 Consumer Behavior (3 semester credit hours) An exposition of the theoretical perspectives of consumer behavior along with practical marketing implication. Study of psychological, sociological and behavioral findings and frameworks with reference to consumer decision-making. Topics will include the consumer decision-making model, individual determinants of consumer behavior and environmental influences on consumer behavior and their impact on marketing. Prerequisite: MKT 6301. (3-0) Y MKT 6321 Interactive and Digital Marketing (3 semester credit hours) Introduction to the theory and practice of interactive and digital marketing. Topics covered include: online-market research, consumer behavior, conversion metrics, and segmentation considerations; ecommerce, search and display advertising, audiences, search engine marketing, email, mobile, video, social networks, and the Internet of Things. (3-0) T MKT 6322 Internet Business Models (3 semester credit hours) Topics to be covered are: consumer behavior on the Internet, advertising on the Internet, competitive strategies, market research using the Internet, brand management, managing distribution and supply chains, pricing strategies, electronic payment systems, and developing virtual organizations. Further, students learn auction theory, web content design, and clickstream analysis. Prerequisite: MKT 6301. (3-0) Y MKT 6323 Database Marketing (3 semester credit hours) Techniques to analyze, interpret, and utilize marketing databases of customers to identify a firm's best customers, understanding their needs, and targeting communications and promotions to retain such customers. Topics

5,537 citations

Journal ArticleDOI
TL;DR: The authors found that people are much more likely to believe stories that favor their preferred candidate, especially if they have ideologically segregated social media networks, and that the average American adult saw on the order of one or perhaps several fake news stories in the months around the 2016 U.S. presidential election, with just over half of those who recalled seeing them believing them.
Abstract: Following the 2016 U.S. presidential election, many have expressed concern about the effects of false stories (“fake news”), circulated largely through social media. We discuss the economics of fake news and present new data on its consumption prior to the election. Drawing on web browsing data, archives of fact-checking websites, and results from a new online survey, we find: (i) social media was an important but not dominant source of election news, with 14 percent of Americans calling social media their “most important” source; (ii) of the known false news stories that appeared in the three months before the election, those favoring Trump were shared a total of 30 million times on Facebook, while those favoring Clinton were shared 8 million times; (iii) the average American adult saw on the order of one or perhaps several fake news stories in the months around the election, with just over half of those who recalled seeing them believing them; and (iv) people are much more likely to believe stories that favor their preferred candidate, especially if they have ideologically segregated social media networks.

3,959 citations

Posted Content
01 Jan 2012
TL;DR: The 2008 crash has left all the established economic doctrines - equilibrium models, real business cycles, disequilibria models - in disarray as discussed by the authors, and a good viewpoint to take bearings anew lies in comparing the post-Great Depression institutions with those emerging from Thatcher and Reagan's economic policies: deregulation, exogenous vs. endoge- nous money, shadow banking vs. Volcker's Rule.
Abstract: The 2008 crash has left all the established economic doctrines - equilibrium models, real business cycles, disequilibria models - in disarray. Part of the problem is due to Smith’s "veil of ignorance": individuals unknowingly pursue society’s interest and, as a result, have no clue as to the macroeconomic effects of their actions: witness the Keynes and Leontief multipliers, the concept of value added, fiat money, Engel’s law and technical progress, to name but a few of the macrofoundations of microeconomics. A good viewpoint to take bearings anew lies in comparing the post-Great Depression institutions with those emerging from Thatcher and Reagan’s economic policies: deregulation, exogenous vs. endoge- nous money, shadow banking vs. Volcker’s Rule. Very simply, the banks, whose lending determined deposits after Roosevelt, and were a public service became private enterprises whose deposits determine lending. These underlay the great moderation preceding 2006, and the subsequent crash.

3,447 citations

01 Aug 2001
TL;DR: The study of distributed systems which bring to life the vision of ubiquitous computing systems, also known as ambient intelligence, is concentrated on in this work.
Abstract: With digital equipment becoming increasingly networked, either on wired or wireless networks, for personal and professional use alike, distributed software systems have become a crucial element in information and communications technologies. The study of these systems forms the core of the ARLES' work, which is specifically concerned with defining new system software architectures, based on the use of emerging networking technologies. In this context, we concentrate on the study of distributed systems which bring to life the vision of ubiquitous computing systems, also known as ambient intelligence.

2,774 citations

Book
01 Jan 1901

2,681 citations