Institution
Indian Institute of Management Calcutta
Education•Kolkata, India•
About: Indian Institute of Management Calcutta is a education organization based out in Kolkata, India. It is known for research contribution in the topics: Supply chain & Emerging markets. The organization has 415 authors who have published 1354 publications receiving 21725 citations. The organization is also known as: IIMC & IIM Calcutta.
Papers published on a yearly basis
Papers
More filters
••
TL;DR: In this paper, the authors combine the resources-based view with the institutional perspective to highlight the costs and benefits of business groups' internationalization, rather than business groups affiliated firms' internationalisation, and consider how ownership heterogeneity among business groups influences the internationalization-performance relationship.
Abstract: Business groups, the dominant organizational form in many Asian markets, have expanded their operations into international markets. We combine the resources-based view with the institutional perspective to highlight the costs and benefits of business groups’ internationalization, rather than business groups’ affiliated firms’ internationalization, and consider how ownership heterogeneity among business groups influences the internationalization-performance relationship. Three ownership types—family, domestic financial institution, and foreign corporate—serve as distinguishing characteristics of business groups and potential moderators of this relationship. In a sample of 185 Indian business groups examined over more than a decade (2000–2010), we find that these three ownership types have a differential impact on the internationalization-performance relationship¸ depending on the level of internationalization of the business group. Specifically¸ we find that at lower levels of internationalization, family and foreign corporate ownership has a positive moderating effect whereas domestic financial institutional ownership has a negative moderating effect. Conversely¸ at higher levels of internationalization, family and foreign corporate ownership has a negative moderating effect, while domestic financial institutional ownership positively moderates the internationalization-performance relationship.
39 citations
••
TL;DR: A system dynamics model of the interplay between technical and behavioral security factors, along with their impact on business value of an organization's IT infrastructure, is developed and suggests that information security drills, analogous to fire drills, may be useful in maintaining user compliance.
Abstract: While technology is important, organizational and human factors also play a crucial role in achieving information security. In this paper we develop a system dynamics model of the interplay between technical and behavioral security factors, along with their impact on business value of an organization's IT infrastructure. The model captures delays associated with perception of security risk, the mechanics of user compliance and the mechanics of risk mitigation achieved by investments in security technology and user training. These structural model components interact to mediate the impact of security incidents on the business value generated by information technology enabled transactions. The model reveals the dynamics of erosion in and recovery of business value resulting from security incidents. Experiments with the model suggest that information security drills, analogous to fire drills, may be useful in maintaining user compliance, in addition to usual training and awareness activities. Among the management policy parameters examined, we find that improvement in realized business value is statistically significant for the minimum security risk the firm is willing to accept, and the proportion of security-related investment spent on security technology versus security training and awareness. We also discuss how our model can be extended to help justify an organization's investments in information security, an objective that has been notoriously difficult to achieve in practice. Copyright © 2008 John Wiley & Sons, Ltd.
39 citations
••
01 Jun 2013TL;DR: It is shown that investors reward growing firms and small companies more if they adopt the countermeasures, which shows that the market views the investment in anti-identity theft as a tool to enhance competitive advantage.
Abstract: Identity theft poses a huge threat to the e-commerce community. Although the crime is a growing menace, firms are uncertain about the payoffs obtained from adoption of identity theft countermeasures. As the cost of implementation of relevant countermeasures is high, senior managers are hesitant to make such investments. Using the event study method, we empirically demonstrate that it is worthy for a firm to adopt such countermeasures. We show that the news of such adoption increases the short term market value of the announcing firm by 0.63% on an average. Our research also finds that early adopters, adopters of sophisticated identity theft countermeasures, firms with high growth potential, and firms with high credit rating show a strong and positive return in market value, whereas small firms demonstrate a moderate but positive reaction. As shown in our research findings, the market rewards early adopters of security technology and adopters of sophisticated measures greatly. To reap the market premium, the industrial practitioners should adopt newer identity theft countermeasures at an earlier time. Furthermore, our study shows that investors reward growing firms and small companies more if they adopt the countermeasures. This shows that the market views the investment in anti-identity theft as a tool to enhance competitive advantage. Our research findings should encourage firms to adopt identity theft countermeasures more proactively.
39 citations
••
TL;DR: In this paper, the authors studied a vehicle supply chain and formulated four different modes of developing charging infrastructures for EVs when: (a) EV manufacturer invests in setting up the charging infrastructure with a government subsidy to EV consumers, namely the Model M, (b) Government invests in charging infrastructure and also provides a subsidy to EVs consumers, such as the Model MG, and (c) Government invested in the Model G.
Abstract: Electric mobility has emerged as a key initiative for the policymakers and the governments to mitigate the carbon footprint of the transportation sector. However, the adoption of electric vehicles (EVs) is slow, primarily due to the scarcity of adequate charging facilities. The intriguing factor in terms of developing charging infrastructure is related to which entity should invest in developing the same. Herein, we study a vehicle supply chain and formulated four different modes of developing charging infrastructures for EVs when: (a) EV manufacturer invests in setting up the charging infrastructure with a government subsidy to EV consumers, namely the Model M, (b) EV manufacturer invests in setting up the charging infrastructure, namely the Model R (c) Government invests in setting up charging infrastructure and also provides a subsidy to EV consumers, namely the Model MG, and (d) Government invests in setting up the charging infrastructure, namely the Model G. Our findings show that the Model MG and M are equally effective for generating the maximum EV demand and market share, thereby require maximum effort for developing the charging infrastructure. Further, social welfare is also maximum in these two cases, which is counterintuitive because government support is more in the Model MG as compared to the Model M. Hence, under a limited budget constraint, the government can provide direct subsidy to EV consumers and let EV manufacturer invests in charging infrastructure to maximize social welfare. Further, the Model MG and M have a lower overall environmental impact when GV's environmental impact is higher than a threshold. Additionally, we provide multifaceted policy recommendations for the government, along with manufacturer strategic choices under different scenarios.
38 citations
•
03 May 2006TL;DR: In this article, the authors propose the use of directional or adaptive antennas that largely reduce radio interference, improving the utilization of wireless medium and the resulting network throughput, which is wasted by the medium access mechanisms of omni-directional antennas.
Abstract: A large portion of the network capacity of an ad hoc network can be wasted by the medium access mechanisms of omni-directional antennas. To overcome this problem, researchers propose the use of directional or adaptive antennas that largely reduce radio interference, improving the utilization of wireless medium and the resulting network throughput.<
38 citations
Authors
Showing all 426 results
Name | H-index | Papers | Citations |
---|---|---|---|
Russell W. Belk | 76 | 351 | 39909 |
Vishal Gupta | 47 | 387 | 9974 |
Sankaran Venkataraman | 32 | 75 | 19911 |
Subrata Mitra | 32 | 219 | 3332 |
Eiji Oki | 32 | 588 | 5995 |
Indranil Bose | 30 | 97 | 3629 |
Pradip K. Srimani | 30 | 268 | 2889 |
Rahul Mukerjee | 30 | 206 | 3507 |
Ruby Roy Dholakia | 29 | 102 | 5158 |
Per Skålén | 25 | 57 | 2763 |
Somprakash Bandyopadhyay | 23 | 111 | 1764 |
Debashis Saha | 22 | 181 | 2615 |
Haritha Saranga | 19 | 42 | 1523 |
Janat Shah | 19 | 52 | 1767 |
Rohit Varman | 18 | 46 | 1387 |