Areas of interest: Organization Theory, Innovation & Technology, Strategy, Nonfinancial Incentives, Social Evaluation, Online Communities, Scientific Teams
Research in progress
R&R, Strategic Management Journal
Org Science 2022
Research Policy 2022
This paper explores how non-monetary incentives (an element of organizational design) effect effort (an important component of collaborative innovation). Just as individual community members differ in their preferences, so do they vary along a series of other dimensions: professional history, experience, skill, and so forth. Here, we explore how the management of an innovation project influences different contributors’ perceptions and engagement. Specifically, we examine how the skills of contributors effect their selection for an open source project in the first place, and how project owners—private individuals or companies—can motivate developers with the right skill to exert continuous effort on a project after joining. We focus on three design parameters that can be managed by founders (founders revealing their corporate affiliation, project acceptance rate and feedback provision time) and test how they impact the effort of different developers within the Stack Overflow and GitHub communities.
Information Technology and Management 2021
Mishra B & Smirnova I. 2021. “Optimal configuration of intrusion detection systems.” Information Technology and Management 22: 231–244.
An intrusion detection system (IDS) can protect your network and computer from a variety of threats. IDSs are designed to assist detection of computer security violations including illegal entry by outsiders and abuse of privileges by insiders. This article develops the clear connection between IDS systems and their economic/managerial impact and presents an optimization model based on game theory to assist firms in the IDS configuration process. The model is based on the fact that the frequencies of false positives and false negatives affect the way firms deal with signals from the IDS, and that configuration affects the behaviors of users significantly. Given that no one configuration will be optimal for all firms, our analysis develops interesting insights into how the firm’s cost parameters, the IDS’s quality parameters, and the external parameters (such as hacker’s benefit from intrusion and the penalty that is imposed when the intrusion is detected) affect the configuration decisions.