Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleNovember 2024
Of Choices and Control - A Comparative Analysis of Government Hosting
- Rashna Kumar,
- Esteban Carisimo,
- Lukas De Angelis Riva,
- Mauricio Buzzone,
- Fabián E. Bustamante,
- Ihsan Ayyub Qazi,
- Mariano G. Beiró
IMC '24: Proceedings of the 2024 ACM on Internet Measurement ConferencePages 462–479https://doi.org/10.1145/3646547.3688447We present the first large-scale analysis of the adoption of third-party serving infrastructures in government digital services. Drawing from data collected across 61 countries spanning every continent and region, capturing over 82% of the world's ...
- extended-abstractMay 2024
Decent-BRM: Decentralization through Block Reward Mechanisms
AAMAS '24: Proceedings of the 23rd International Conference on Autonomous Agents and Multiagent SystemsPages 2483–2485Proof-of-Work (PoW) is a consensus algorithm where miners solve cryptographic puzzles to mine blocks and obtain the reward specified through the underlying blockchain's Block Reward Mechanism (BRM). Rewards from mining the block have a high associated ...
- research-articleAugust 2023
Shared language in the team network-performance association: Reconciling conflicting views of the network centralization effect on team performance
We reconcile two conflicting views of the network centralization effect on team performance. In one view, a centralized network is problematic because it limits knowledge transfer, making it harder for team members to discover productive combinations of ...
- abstractJune 2023
Each at its Own Pace: Third-Party Dependency and Centralization Around the World
SIGMETRICS '23: Abstract Proceedings of the 2023 ACM SIGMETRICS International Conference on Measurement and Modeling of Computer SystemsPages 43–44https://doi.org/10.1145/3578338.3593539We describe the results of a large-scale study of third-party dependencies around the world based on regional top-500 popular websites accessed from vantage points in 50 countries, together covering all inhabited continents. This broad perspective shows ...
Also Published in:
ACM SIGMETRICS Performance Evaluation Review: Volume 51 Issue 1 - research-articleMarch 2023
Each at its Own Pace: Third-Party Dependency and Centralization Around the World
Proceedings of the ACM on Measurement and Analysis of Computing Systems (POMACS), Volume 7, Issue 1Article No.: 4, Pages 1–29https://doi.org/10.1145/3579437We describe the results of a large-scale study of third-party dependencies around the world based on regional top-500 popular websites accessed from vantage points in 50 countries, together covering all inhabited continents. This broad perspective shows ...
-
- research-articleOctober 2022
13 propositions on an internet for a "burning world"
TAURIN+BGI '22: Proceedings of the ACM SIGCOMM Joint Workshops on Technologies, Applications, and Uses of a Responsible Internet and Building Greener InternetPages 1–5https://doi.org/10.1145/3538395.3545312In this paper, we outline thirteen propositions on the state of the Internet and digital infrastructures. The core of our theses is that the centralizing Internet of today will not be sustainable and resilient, neither in terms of its energy needs nor ...
- research-articleFebruary 2022
An Empirical View on Consolidation of the Web
ACM Transactions on Internet Technology (TOIT), Volume 22, Issue 3Article No.: 70, Pages 1–30https://doi.org/10.1145/3503158The majority of Web content is delivered by only a few companies that provide Content Delivery Infrastructuress (CDIss) such as Content Delivery Networkss (CDNss) and cloud hosts. Due to increasing concerns about trends of centralization, empirical ...
- research-articleJanuary 2021
Multilocation Newsvendor Problem: Centralization and Inventory Pooling
We study a multilocation newsvendor model with a retailer owning multiple retail stores, each of which is operated by a manager who decides the order quantity for filling random customer demand of a product. Store managers and the retailer are all risk ...
- research-articleDecember 2020
Configurations for Achieving Organizational Ambidexterity with Digitization
Information Systems Research (INFORMS-ISR), Volume 31, Issue 4Pages 1376–1397https://doi.org/10.1287/isre.2020.0950Organizational ambidexterity refers to the capability of businesses to balance the pursuit of radical innovation simultaneously with incremental innovation. It echoes the popular notion that to thrive well in a competitive economy, businesses need to ...
Due to digitization, new mechanisms have emerged for achieving organizational ambidexterity, defined as the ability to pursue both efficiency and flexibility while balancing exploitation and exploration. This study investigates the role of digitization in ...
- research-articleFebruary 2020
Should Artificial Intelligence Governance be Centralised?: Design Lessons from History
AIES '20: Proceedings of the AAAI/ACM Conference on AI, Ethics, and SocietyPages 228–234https://doi.org/10.1145/3375627.3375857Can effective international governance for artificial intelligence remain fragmented, or is there a need for a centralised international organisation for AI? We draw on the history of other international regimes to identify advantages and disadvantages ...
- research-articleMarch 2019
Why do surgeons schedule their own surgeries?
Journal of Operations Management (WILEY-JOM), Volume 65, Issue 3Pages 262–281https://doi.org/10.1002/joom.1012AbstractSurgery is a knowledge intensive, high‐risk professional service. Most hospitals give surgeons considerable autonomy in deciding which patients to operate on and when. In theory, this allows surgeons the operational flexibility to prioritize ...
- research-articleOctober 2018
The Gap Game
CCS '18: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications SecurityPages 713–728https://doi.org/10.1145/3243734.3243737Blockchain-based cryptocurrencies secure a decentralized consensus protocol by incentives. The protocol participants, called miners, generate (mine) a series of blocks, each containing monetary transactions created by system users. As incentive for ...
- research-articleOctober 2017
Network security architectures for VANET
SIN '17: Proceedings of the 10th International Conference on Security of Information and NetworksPages 73–79https://doi.org/10.1145/3136825.3136890In recent years, cyber security oriented research is paying much close attention on Vehicular Adhoc NETworks (VANETs). However, existing vehicular networks do not meet current security requirements. Typically for dynamic networks, maximal ...
- articleMarch 2017
A configural approach to coordinating expertise in software development teams
Despite the recognition of how important expertise coordination is to the performance of software development teams, understanding of how expertise is coordinated in practice is limited. We adopt a configural approach to develop a theoretical model of ...
- research-articleMarch 2016
Encouraging Diversity- and Representation-Awareness in Geographically Centralized Content
IUI '16: Proceedings of the 21st International Conference on Intelligent User InterfacesPages 7–18https://doi.org/10.1145/2856767.2856775In centralized countries, not only population, media and economic power are concentrated, but people give more attention to central locations. While this is not inherently bad, this behavior extends to micro-blogging platforms: central locations get ...
- articleApril 2014
Who Lives in the C-Suite? Organizational Structure and the Division of Labor in Top Management
<P>Top management structures in large U.S. firms have changed significantly since the mid-1980s. The size of the executive team—the group of managers reporting directly to the CEO—doubled during this period. This growth was driven primarily by an ...
- articleOctober 2012
Hierarchies and the Survival of Prisoners of War During World War II
Using a comprehensive database of American prisoners of war during World War II, we find that survival from captivity generally declines as the hierarchy of a prisoner's group becomes steeper or more closely matches the military's established hierarchy. ...
- research-articleMarch 2012
ICTs and development in the thai bureaucracy: an examination of decentralization and organizational change
ICTD '12: Proceedings of the Fifth International Conference on Information and Communication Technologies and DevelopmentPages 36–45https://doi.org/10.1145/2160673.2160679ICTs are frequently looked to as a missing link between traditional bureaucracy and the modernization of public administration and service delivery. Through the empirical research in the Thai public sector, we find that there is a fundamental gap ...
- research-articleMarch 2011
HealthAchieve 2010: a Student's Perspective on Canadian transformational healthcare delivery
Here we summarize the HealthAchieve 2010 event held November 8th-10th in Toronto, Canada. HealthAchieve is considered the definitive Canadian healthcare delivery experience conference. The insights garnered among attending delegates serves to expand the ...
- research-articleOctober 2009
A centralized approach to managing a large student staff
SIGUCCS '09: Proceedings of the 37th annual ACM SIGUCCS fall conference: communication and collaborationPages 143–150https://doi.org/10.1145/1629501.1629528Recognizing the importance of the student staff to the overall departmental mission, the Information Technology Services (ITS) department at Ithaca College has centralized key management functions into a dedicated full-time position, the Coordinator of ...