scispace - formally typeset
Search or ask a question
Institution

Indian Institute of Management Calcutta

EducationKolkata, India
About: Indian Institute of Management Calcutta is a education organization based out in Kolkata, India. It is known for research contribution in the topics: Supply chain & Emerging markets. The organization has 415 authors who have published 1354 publications receiving 21725 citations. The organization is also known as: IIMC & IIM Calcutta.


Papers
More filters
Journal ArticleDOI
TL;DR: In this paper, the authors combine the resources-based view with the institutional perspective to highlight the costs and benefits of business groups' internationalization, rather than business groups affiliated firms' internationalisation, and consider how ownership heterogeneity among business groups influences the internationalization-performance relationship.
Abstract: Business groups, the dominant organizational form in many Asian markets, have expanded their operations into international markets. We combine the resources-based view with the institutional perspective to highlight the costs and benefits of business groups’ internationalization, rather than business groups’ affiliated firms’ internationalization, and consider how ownership heterogeneity among business groups influences the internationalization-performance relationship. Three ownership types—family, domestic financial institution, and foreign corporate—serve as distinguishing characteristics of business groups and potential moderators of this relationship. In a sample of 185 Indian business groups examined over more than a decade (2000–2010), we find that these three ownership types have a differential impact on the internationalization-performance relationship¸ depending on the level of internationalization of the business group. Specifically¸ we find that at lower levels of internationalization, family and foreign corporate ownership has a positive moderating effect whereas domestic financial institutional ownership has a negative moderating effect. Conversely¸ at higher levels of internationalization, family and foreign corporate ownership has a negative moderating effect, while domestic financial institutional ownership positively moderates the internationalization-performance relationship.

39 citations

Journal ArticleDOI
TL;DR: A system dynamics model of the interplay between technical and behavioral security factors, along with their impact on business value of an organization's IT infrastructure, is developed and suggests that information security drills, analogous to fire drills, may be useful in maintaining user compliance.
Abstract: While technology is important, organizational and human factors also play a crucial role in achieving information security. In this paper we develop a system dynamics model of the interplay between technical and behavioral security factors, along with their impact on business value of an organization's IT infrastructure. The model captures delays associated with perception of security risk, the mechanics of user compliance and the mechanics of risk mitigation achieved by investments in security technology and user training. These structural model components interact to mediate the impact of security incidents on the business value generated by information technology enabled transactions. The model reveals the dynamics of erosion in and recovery of business value resulting from security incidents. Experiments with the model suggest that information security drills, analogous to fire drills, may be useful in maintaining user compliance, in addition to usual training and awareness activities. Among the management policy parameters examined, we find that improvement in realized business value is statistically significant for the minimum security risk the firm is willing to accept, and the proportion of security-related investment spent on security technology versus security training and awareness. We also discuss how our model can be extended to help justify an organization's investments in information security, an objective that has been notoriously difficult to achieve in practice. Copyright © 2008 John Wiley & Sons, Ltd.

39 citations

Journal ArticleDOI
01 Jun 2013
TL;DR: It is shown that investors reward growing firms and small companies more if they adopt the countermeasures, which shows that the market views the investment in anti-identity theft as a tool to enhance competitive advantage.
Abstract: Identity theft poses a huge threat to the e-commerce community. Although the crime is a growing menace, firms are uncertain about the payoffs obtained from adoption of identity theft countermeasures. As the cost of implementation of relevant countermeasures is high, senior managers are hesitant to make such investments. Using the event study method, we empirically demonstrate that it is worthy for a firm to adopt such countermeasures. We show that the news of such adoption increases the short term market value of the announcing firm by 0.63% on an average. Our research also finds that early adopters, adopters of sophisticated identity theft countermeasures, firms with high growth potential, and firms with high credit rating show a strong and positive return in market value, whereas small firms demonstrate a moderate but positive reaction. As shown in our research findings, the market rewards early adopters of security technology and adopters of sophisticated measures greatly. To reap the market premium, the industrial practitioners should adopt newer identity theft countermeasures at an earlier time. Furthermore, our study shows that investors reward growing firms and small companies more if they adopt the countermeasures. This shows that the market views the investment in anti-identity theft as a tool to enhance competitive advantage. Our research findings should encourage firms to adopt identity theft countermeasures more proactively.

39 citations

Journal ArticleDOI
TL;DR: In this paper, the authors studied a vehicle supply chain and formulated four different modes of developing charging infrastructures for EVs when: (a) EV manufacturer invests in setting up the charging infrastructure with a government subsidy to EV consumers, namely the Model M, (b) Government invests in charging infrastructure and also provides a subsidy to EVs consumers, such as the Model MG, and (c) Government invested in the Model G.
Abstract: Electric mobility has emerged as a key initiative for the policymakers and the governments to mitigate the carbon footprint of the transportation sector. However, the adoption of electric vehicles (EVs) is slow, primarily due to the scarcity of adequate charging facilities. The intriguing factor in terms of developing charging infrastructure is related to which entity should invest in developing the same. Herein, we study a vehicle supply chain and formulated four different modes of developing charging infrastructures for EVs when: (a) EV manufacturer invests in setting up the charging infrastructure with a government subsidy to EV consumers, namely the Model M, (b) EV manufacturer invests in setting up the charging infrastructure, namely the Model R (c) Government invests in setting up charging infrastructure and also provides a subsidy to EV consumers, namely the Model MG, and (d) Government invests in setting up the charging infrastructure, namely the Model G. Our findings show that the Model MG and M are equally effective for generating the maximum EV demand and market share, thereby require maximum effort for developing the charging infrastructure. Further, social welfare is also maximum in these two cases, which is counterintuitive because government support is more in the Model MG as compared to the Model M. Hence, under a limited budget constraint, the government can provide direct subsidy to EV consumers and let EV manufacturer invests in charging infrastructure to maximize social welfare. Further, the Model MG and M have a lower overall environmental impact when GV's environmental impact is higher than a threshold. Additionally, we provide multifaceted policy recommendations for the government, along with manufacturer strategic choices under different scenarios.

38 citations

Book
03 May 2006
TL;DR: In this article, the authors propose the use of directional or adaptive antennas that largely reduce radio interference, improving the utilization of wireless medium and the resulting network throughput, which is wasted by the medium access mechanisms of omni-directional antennas.
Abstract: A large portion of the network capacity of an ad hoc network can be wasted by the medium access mechanisms of omni-directional antennas. To overcome this problem, researchers propose the use of directional or adaptive antennas that largely reduce radio interference, improving the utilization of wireless medium and the resulting network throughput.<

38 citations


Authors

Showing all 426 results

NameH-indexPapersCitations
Russell W. Belk7635139909
Vishal Gupta473879974
Sankaran Venkataraman327519911
Subrata Mitra322193332
Eiji Oki325885995
Indranil Bose30973629
Pradip K. Srimani302682889
Rahul Mukerjee302063507
Ruby Roy Dholakia291025158
Per Skålén25572763
Somprakash Bandyopadhyay231111764
Debashis Saha221812615
Haritha Saranga19421523
Janat Shah19521767
Rohit Varman18461387
Network Information
Related Institutions (5)
Copenhagen Business School
9.6K papers, 341.8K citations

84% related

Vienna University of Economics and Business
6.6K papers, 176.4K citations

84% related

University of Mannheim
12.9K papers, 446.5K citations

83% related

Athens University of Economics and Business
6.9K papers, 177.8K citations

83% related

Singapore Management University
8.3K papers, 239.6K citations

82% related

Performance
Metrics
No. of papers from the Institution in previous years
YearPapers
20233
202216
202189
202080
201998
201873