Managing inventory over a short season: models with two procurement opportunities
Motivated by many recent applications reported in the literature, we examine the impact of a
second procurement opportunity on inventory management of products with short selling …
second procurement opportunity on inventory management of products with short selling …
Agent-based simulation for computational experimentation: Developing an artificial labor market
A Chaturvedi, S Mehta, D Dolk, R Ayer - European Journal of Operational …, 2005 - Elsevier
This paper discusses the creation of an artificial labor market (ALM) as an agent-based
simulation model. We trace the development of the ALM by adapting the traditional simulation life …
simulation model. We trace the development of the ALM by adapting the traditional simulation life …
Privacy and pricing personal information
J Jaisingh, J Barron, S Mehta, A Chaturvedi - European Journal of …, 2008 - Elsevier
The issues we address here are – How should a firm (eg Internet service provider (ISP)) that
is capable of collecting personal information (browsing information, purchase history, etc.) …
is capable of collecting personal information (browsing information, purchase history, etc.) …
Context effects and models of preferential choice: implications for consumer behavior
JR Busemeyer, R Barkan, S Mehta… - Marketing …, 2007 - journals.sagepub.com
The article summarizes extant research on context effects and choice theories in a straightforward
fashion. The context effects are used as benchmarks to compare six choice theories. …
fashion. The context effects are used as benchmarks to compare six choice theories. …
Affiliation or Situation: What Drives Strategic Decisionmaking in Crisis Response?
P Drnevich, R Ramanujam, S Mehta… - Journal of Managerial …, 2009 - JSTOR
Inter-organizational teams are an increasingly common organizational form for responding
to crisis situations. The effectiveness of these forms is dependent on the composition and …
to crisis situations. The effectiveness of these forms is dependent on the composition and …
The experimental analysis of information security management issues for online financial services
M Gupta, A Chaturvedi, S Mehta, L Valeri - 2000 - aisel.aisnet.org
E-commerce offers the banking industry great opportunity, but also creates a set of new risks
and vulnerability such as security threats. Information security, therefore, is an essential …
and vulnerability such as security threats. Information security, therefore, is an essential …
Quality of education, productivity changes, and income distribution
SR Mehta - Journal of Labor Economics, 2000 - journals.uchicago.edu
A general equilibrium model of a dual economy is constructed with workers and managers
and hierarchical production. Ability is continuous, and there is perfect competition in the …
and hierarchical production. Ability is continuous, and there is perfect competition in the …
The law of one price and a theory of the firm: a Ricardian perspective on interindustry wages
SR Mehta - The Rand Journal of Economics, 1998 - JSTOR
I use a hierarchical perspective to explain the pattern of interindustry wages and capital
intensities. Industries that have more productive technologies pay more than less-productive …
intensities. Industries that have more productive technologies pay more than less-productive …
Preparation for entrepreneurship: does it matter?
A Cooper, S Mehta - The Journal of Private Equity, 2006 - JSTOR
We begin with preparation. Cooper and Mehta review the files of nearly 3,000 firms to
assemble data sets to analyze a series of straightforward questions about preparing to start a …
assemble data sets to analyze a series of straightforward questions about preparing to start a …
Economic analysis of tradeoffs between security and disaster recovery
M Gupta, A Chaturvedi, S Mehta - Communications of the …, 2011 - aisel.aisnet.org
The threat of computer crime is increasingly becoming a big concern for organizations.
Organizations have to continuously manage their investment in information security technologies …
Organizations have to continuously manage their investment in information security technologies …