@conference {1974326, title = {Supporting Student Collaboration for Online Learning: The Impact of Two Instructional Interventions}, booktitle = {Association for Information Systems - Special Interest Group - Education (AIS - SIG - Ed) - 2021}, year = {2022}, month = {2022}, abstract = {This research provides an overview of an exploratory study that is being conducted to investigate two potential ways in which an instructor may be able to support online student teams assigned to analyze a case and create a collaborative digital document. Specifically, the study was designed to examine the impact of instructor leadership style and process structure on student perceptions and performance. Data has been collected for 60 3-person teams of students enrolled in an upper-division undergraduate information systems course entitled {\textquotedblleft}Business Process Management.{\textquotedblright} The research data has been collected and will be analyzed. Preliminary findings from the study will be discussed.}, keywords = {BIS}, author = {Tyran,Craig K and Raja,V.T. and Tyran,Kristi L} } @article {1982676, title = {Teaching and maintaining campus community during a pandemic}, year = {2020}, month = {2020}, address = {Portland (Zoom)}, keywords = {BIS}, author = {Raja,V.T. and Lewis,Steven and Tolan,Jody} } @article {1970521, title = {BA302: Microsoft Dynamics NAV ERP Exercise/Walkthrough}, year = {2016}, month = {2016}, pages = {25}, abstract = {Whether you enter the workforce as a sales manager, financial accountant or office admin, chances are that you will be working with some type of Enterprise Resource Planning (ERP) system. The purpose of this exercise/walkthrough is to familiarize you with a typical business process as it is commonly executed with the help of one of the leading ERP systems in the market today {\textendash} Microsoft Dynamics NAV. This exercise will walk you through the six steps of a typical sales process: 1) Creating a customer order; 2) Backordering an out-of-stock item; 3) Receiving the backordered item; 4) Shipping the customer the ordered items and invoicing the customer; 5) Receiving payment from the customer; 6) Making a payment to the vendor from whom we backordered. As you make your way through this exercise, you should realize that in a real company this process would be executed by different people working in different departments. They all will interact with the ERP; i.e., they all retrieve information from the ERP and store new information in it, as the sales process progresses. In this exercise you take on the role of each of these people, giving you a sense of how the sales order is processed both by the company and by the ERP.}, keywords = {Accounting, BIS}, url = {http://hdl.handle.net/1957/59858}, author = {Curry,Michael and Marshall,Byron and Raja,V.T. and Reitsma,Reindert and Wydner,Kirk} } @article {1972311, title = {What Do They Know About Me In The Cloud? A Comparative Law Perspective On Protecting the Privacy and Security of Sensitive Consumer Data}, journal = {American Business Law Journal}, volume = {50}, year = {2013}, month = {2013}, pages = {413-482}, address = {Wiley Periodicals, Inc., Malden, MA}, abstract = {How much does the cloud know about us? Should we care? In cloud computing, sensitive personal data flows in a global network of internet connected computers, creating attractive targets for hackers, challenging law enforcement and raising concerns about government surveillance. From an information privacy perspective, this article discusses how well the management information systems practices and laws in the United States and Europe protect the privacy and security of sensitive consumer data in the cloud. It examines policies and proposed regulations and makes suggestions for legal reforms in both jurisdictions to protect the privacy and security of sensitive information.}, keywords = {BIS, Business Law}, author = {King,Nancy and Raja,V.T.} } @article {1972316, title = {Protecting the Privacy and Security of Sensitive Customer Data in the Cloud}, journal = {Computer Law and Security Review}, volume = {28}, year = {2012}, month = {2012}, pages = {308-319}, address = {Oxford}, abstract = {The global ubiquity of cloud computing may expose consumers{\textquoteright} sensitive personal data to significant privacy and security threats. A critical challenge for the cloud computing industry is to earn consumers{\textquoteright} trust by ensuring adequate privacy and security for sensitive consumer data. Regulating consumer privacy and security also challenges government enforcement of data protection laws that were designed with national borders in mind. From an information privacy perspective, this article analyses how well the regulatory frameworks in place in Europe and the United States help protect the privacy and security of sensitive consumer data in the cloud. It makes suggestions for regulatory reform to protect sensitive infomraiton in cloud computing environments and to remove regulatory constraints that limit the growth of this vibrant new industry.}, keywords = {BIS, Business Law}, url = {www.Sciencedirect.com}, author = {King,Nancy and Raja,V.T.} } @article {1982681, title = {The Impact of Relational and Task-Oriented Leaders on Virtual Team Performance}, year = {2010}, month = {2010}, address = {Delft, The Netherlands}, keywords = {BIS}, author = {Bajwa,Deepinder and Tyran,Craig and Raja,V.T. and Tyran,Kristi} } @article {1982691, title = {The adoption and use of technologies to support virtual teams}, year = {2009}, month = {2009}, address = {Toronto}, keywords = {BIS}, author = {Bajwa,Deepinder S. and Raja,V.T. and Tyran,Craig K and Tyran,Kristi} } @article {1982696, title = {Untitled}, year = {2009}, month = {2009}, address = {La Jolla, California}, keywords = {BIS}, author = {Raja,V.T.} } @article {1982686, title = {Using Wikis to Support Virtual Teams in Education: The Effect of Instructor Leadership Style.}, year = {2009}, month = {2009}, address = {Phoenix, Arizona}, keywords = {BIS}, author = {Tyran,Craig and Raja,V.T. and Tyran,Kristi} } @article {1974336, title = {An Efficient Heuristic for Solving an Extended Capacitated Concentrator Location Problem}, journal = {Telecommunication Systems}, volume = {23}, year = {2003}, month = {2003}, pages = {171-199}, abstract = {In this paper, a mathematical model and a solution algorithm are developed for solving an extended capacitated concentrator location problem. Our model extends the conventional formulation by simultaneously addressing the two capacity constraints, total connection ports and maximum data processing rate, on each concentrator to be selected for satisfying the communication demands of the given end-user nodes. Since the problem is NP-complete, an efficient and effective Lagrangian heuristic is developed and tested by solving 100 randomly generated test problems with sizes ranging from 30(nodes){\texttimes}30(concentrators) to150{\texttimes}30. Altogether 58\% of the tested problems are solved optimally with an average solution gap 0.36\% from the optimality and average solution times are from a few seconds to one half of a minute.}, keywords = {BIS}, author = {Raja,V.T. and Han,Bernard T.} } @article {1974331, title = {A GRASP Heuristic for Solving an Extended Capacitated Concentrator Location Problem}, journal = {International Journal of Information Technology and Decision Making}, volume = {2}, year = {2003}, month = {2003}, pages = {597-618}, address = {World Scientific Publishing Company}, abstract = {Local Access Networks (LACNs) are often considered the "last mile" over the Internet provided that they are connected to some existing Wide Area Network backbone. In this paper, a revised LACN-WAN interconnection model is presented as an extension to the conventional Capacitated Concentrator Location Problem (CCLP). An efficient heuristic is also developed to seek near-optimal deployment of telecommunication devices (e.g. links, concentrators, etc.) while minimizing the total connection costs for the network interconnection. Our solution algorithm could serve as a decision-making tool in solving problems with a real world size (i.e. 120 nodes and 30 concentrators).}, keywords = {BIS}, author = {Han ,Bernard T. and Raja,V.T.} } @article {1982701, title = {An AI-based Heuristic for solving an Extended Concentrator Location Problem}, year = {2002}, month = {2002}, address = {Corvallis, OR}, keywords = {BIS}, author = {Raja,V.T.} } @article {1982706, title = {A Lagrangian Heuristic for Network Design}, year = {2001}, month = {2001}, address = {Corvallis, OR}, keywords = {BIS}, author = {Raja,V.T.} } @article {1982711, title = {Untitled}, year = {2000}, month = {2000}, keywords = {BIS}, author = {Raja,V.T.} } @article {1982716, title = {Using GRASP to solve the Capacitated Concentrator Location Problem}, year = {2000}, month = {2000}, address = {Orlando, Florida}, keywords = {BIS}, author = {Raja,V.T. and Han,Bernard T.} } @article {1982726, title = {A Comparison of Two Modern Heuristics for Designing Local Access Networks}, year = {1999}, month = {1999}, address = {Philadelphia, Pennsylvania}, keywords = {BIS}, author = {Raja,V.T. and Han ,Bernard T.} } @article {1982721, title = {The State of the Art of Network Design and Management}, year = {1999}, month = {1999}, address = {New Orleans}, keywords = {BIS}, author = {Raja,V.T. and Han,Bernard T.} } @article {1982736, title = {An AI-based Heuristic for solving a Generalized Concentrator Location Problem}, year = {1998}, month = {1998}, address = {Seattle, WA}, keywords = {BIS}, author = {Raja,V.T. and Han ,Bernard T.} } @article {1982741, title = {An Efficient Heuristic for Solving a Generalized Concentrator Location Problem}, year = {1998}, month = {1998}, address = {Seattle, WA}, keywords = {BIS}, author = {Raja,V.T. and Han,Bernard T.} } @article {1982746, title = {A Neural-Net Gaussian Machine for Optimal Local Access Network Design}, year = {1998}, month = {1998}, address = {Baltimore, Maryland}, keywords = {BIS}, author = {Raja,V.T. and Han ,Bernard T.} } @article {1982751, title = {Student Perceptions of Electronic Classrooms}, year = {1998}, month = {1998}, address = {Chicago, Illinois}, keywords = {BIS}, author = {Raja,V.T. and Kumar,Anil} } @article {1982731, title = {Untitled}, year = {1998}, month = {1998}, keywords = {BIS}, author = {Raja,V.T.} } @article {1982756, title = {Integration of India into the Global Economy {\textquotedblright} An Information Technology Perspective}, year = {1997}, month = {1997}, address = {Dekalb, Illinois}, keywords = {BIS}, author = {Raja,V.T. and Kumar,Anil} } @article {1982761, title = {Some Design and Planning Issues for Local Access Networks}, year = {1997}, month = {1997}, address = {Taiwan}, keywords = {BIS}, author = {Raja,V.T. and Han ,Bernard T.} } @article {1982771, title = {A Lagrangean Heuristic for the Design of Capacitated Star-Star Concentrator Networks}, year = {1995}, month = {1995}, address = {Los Angeles, CA}, keywords = {BIS}, author = {Raja,V.T.} } @article {1982766, title = {Optimal Telecommunication Facility Planning Under Uncertainty}, year = {1995}, month = {1995}, address = {Pittsburgh, PA}, keywords = {BIS}, author = {Raja,V.T. and Han,Bernard T.} } @article {1982776, title = {A Robustness Approach to the Telecommunication Facility Management Problem in the Presence of Demand Uncertainty from End-Users}, year = {1995}, month = {1995}, address = {Boca Raton, Florida}, keywords = {BIS}, author = {Raja,V.T. and Han ,Bernard T. and Chen,Bin Tong} } @article {1982781, title = {An Intelligent Solver for the Generalized Telecommunication Facility Location Problem}, year = {1994}, month = {1994}, address = {Honolulu, Hawaii}, keywords = {BIS}, author = {Raja,V.T. and Han,Bernard T.} }