Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Chandrasekar Subramaniam is active.

Publication


Featured researches published by Chandrasekar Subramaniam.


decision support systems | 2009

Determinants of open source software project success: A longitudinal study

Chandrasekar Subramaniam; Ravi Sen; Matthew L. Nelson

In this paper, we investigate open source software (OSS) success using longitudinal data on OSS projects. We find that restrictive OSS licenses have an adverse impact on OSS success. On further analysis, restrictive OSS license is found to be negatively associated with developer interest, but is positively associated with the interest of non-developer users and project administrators. We also show that developer and non-developer interest in the OSS project and the project activity levels in any time period significantly affect the project success measures in subsequent time period. The implications of our findings for OSS research and practice are discussed.


Information Technology & Management | 2004

The Effects of Process Characteristics on the Value of B2B E-Procurement

Chandrasekar Subramaniam; Michael J. Shaw

Even as more organizations are moving towards implementing Web-based B2B procurement solutions, they are unsure of the real benefits of the Web. In other words, what is the value of B2B e-procurement to an organization and how to measure this value? What factors affect this value? In this paper, we discuss an evaluation framework to determine the value of B2B e-procurement and the effect of process characteristics on the value. We use an empirical study to highlight the different value created by different procurement types. We then develop a more comprehensive economic model to capture the additional effects of demand volume and process complexity. The integration of theoretical and empirical approaches provides a strong foundation to develop and evaluate useful adoption strategies for B2B e-procurement.


Journal of Management Information Systems | 2008

Understanding the Value of Countermeasure Portfolios in Information Systems Security

Ram L. Kumar; Sungjune Park; Chandrasekar Subramaniam

Organizations are faced with a variety of information security threats and implement several information system security countermeasures (ISSCs) to mitigate possible damage due to security attacks. These security countermeasures vary in their ability to deal with different types of security attacks and, hence, are implemented as a portfolio of ISSCs. A key challenge for organizations is to understand the economic consequences of security attacks relative to the ISSC portfolio implemented. This paper combines the risk analysis and disaster recovery perspectives to build an integrated simulation model of ISSC portfolio value. The model incorporates the characteristics of an ISSC portfolio relative to the threat and business environments and includes the type of attack, frequency of attacks, possible damage, and the extent and time of recovery from damage. The simulation experiments provide interesting insights into the interactions between ISSC portfolio components and characteristics of business and threat environments in determining portfolio value.


decision support systems | 2011

Open source software licenses: Strong-copyleft, non-copyleft, or somewhere in between?

Ravi Sen; Chandrasekar Subramaniam; Matthew L. Nelson

Studies on open source software (OSS) have shown that the license under which an OSS is released has an impact on the success or failure of the software. In this paper, we model the relationship between an OSS developers utility, the effort that goes into developing an OSS, his attitude towards the freedom to choose an OSS license, and the choice of OSS license. We find that the larger the effort to develop OSS, the more is the likelihood that the OSS license would be free from restrictions. Interestingly, the result holds even when all OSS developers prefer restrictive licenses or less-restrictive license. The results suggest that least-restrictive or non-copyleft license will dominate other types of OSS license when a large effort is required to develop derivative software. On the other hand, most-restrictive or strong-copyleft licenses will be the dominant license when minimal effort is required to develop the original OSS and the derivative software.


Journal of Organizational Computing and Electronic Commerce | 2011

Understanding and Predicting Radio Frequency Identification (RFID) Adoption in Supply Chains

Xiaoran Wu; Chandrasekar Subramaniam

As an emerging and a promising technology for supply chain management, radio frequency identification (RFID) has generated a significant amount of interest from both practitioners and researchers in recent years. However, the factors important for RFIDs adoption in supply chains have not been well understood. Many organizations are reluctant to participate in supply-chain level RFID projects because of this lack of understanding. Drawing on innovation diffusion theory and technology-organization-environment framework, we developed a conceptual model for RFID adoption in supply chains. Survey data were collected worldwide and included different players in supply chains, such as manufacturers, transporters, wholesalers, and retailers. Our analysis based on logistic regression demonstrated that technology complexity, technology maturity, top management support, trading partner power, and trading partner readiness were significant predictors for RFID adoption in supply chain activities. This study is the first empirical study to test and validate technology maturity as an important factor for technology adoption. We conclude the article by discussing the theoretical and practical implications of our research findings.


hawaii international conference on system sciences | 2009

New Understanding of RFID Adoption and Infusion in Retail Supply Chain

Xiaoran Wu; Chandrasekar Subramaniam

Information technology adoption and infusion research has yielded many models in which different determinants have been investigated; however, Radio Frequency Identification (RFID) as an emerging technology has not been studied well from a supply chain perspective. Using the TechnologyOrganization-Environment (TOE) framework, we develop a theoretical model for RFID adoption and infusion. We include the development status of technology, which is an important factor in adoption decisions, but has been ignored in IS literature. By adding maturation of technology as one of determinants of adoption and infusion, the new model is more general and robust than previous adoption models of RFID in literature. We propose to empirically test the model with a large sample size covering the retail supply chain.


decision support systems | 2009

The sustainability of B2B e-marketplaces: Ownership structure, market competition, and prior buyer-seller connections

Kexin Zhao; Mu Xia; Michael J. Shaw; Chandrasekar Subramaniam

B2B e-marketplaces alter the structure of buyer-seller trading networks. To study the network-level structural changes caused by the emergence of e-marketplaces, we develop a multiple-player noncooperative game, where rational firms select optimal interfirm connections and the network is endogenously formed and evolved. We examine the conditions under which both neutral and biased B2B e-markets will sustain, when previous buyer-seller connections exist. We test our model in both the oligopoly market and the oligopsony market. Our analysis explains how ownership structures and market competition interact with each other to affect e-market sustainability. We also identify other critical factors for sustainable e-markets and their social welfare implications.


Information & Management | 2015

Information technology and interorganizational learning

Sungjune Park; Antonis C. Stylianou; Chandrasekar Subramaniam; Yuan Niu

We model an interorganizational learning to examine the implications of IT.A framework is developed to select appropriate knowledge management strategies.The size of a firm is important in determining its learning mechanism and strategy.Fast learning from partners is beneficial when a firms internal learning is slow. In this paper, we study the impact of IT-enabled learning mechanisms and learning strategies on the long-term knowledge outcomes of a firm in an interorganizational setting. Consistent with prior research in this area, we use a computational simulation model to study four IT-enabled learning mechanisms: internal electronic communication networks, external communication networks, company knowledge repositories and portals, and interorganizational knowledge repositories and portals. We also explore the interactions between a firms internal and external learning strategies and these learning mechanisms under three different scenarios of partner size symmetry.


International Journal of Information Technology and Decision Making | 2013

UNDERSTANDING DIFFERENCES BETWEEN ADOPTERS AND NONADOPTERS OF INFORMATION TECHNOLOGY PROJECT PORTFOLIO MANAGEMENT

Haya Ajjan; Ram L. Kumar; Chandrasekar Subramaniam

With the increased interest among organizations in managing Information Technology (IT) projects as a portfolio, there has been a growing need for research on factors influencing adoption of IT Project Portfolio Management (ITPPM). ITPPM allows organizations to improve the alignment of IT projects with organizational strategy, by balancing the risks and returns from inter-related projects. To contribute to our understanding of ITPPM, this study examines the adoption of ITPPM through the theoretical lens of diffusion of innovation. Using the technology, organization, and environment (TOE) framework, we model ITPPM adoption and test our model using survey data from 302 project managers. Our results show that an organizations external pressure, ITPPM costs, organizational support, quality of data on existing IT projects, number of IT projects within the organization, and business resistance are significantly related to the adoption decision. We also find interesting results in how expected benefits of ITPPM and compatibility are perceived as equally important by both adopters and nonadopters. In light of the increasingly complex IT project management environment faced by organizations, our paper helps managers to understand and focus on key enablers of ITPPM adoption and better manage ITPPM inhibitors.


Journal of Enterprise Information Management | 2016

Information technology portfolio management implementation: a case study

Haya Ajjan; Ram L. Kumar; Chandrasekar Subramaniam

Purpose The purpose of this paper is to examine the implementation of IT portfolio management (IT PoM) and develop a framework guided by adaptive structuration theory to describe the key structures, features, and appropriation steps needed to effectively manage IT investments and assets. Design/methodology/approach Using a longitudinal case study approach, data were collected over an eight-month period from a US Fortune 500 company during its IT PoM implementation effort. Findings The case analysis highlights three major IT PoM features appropriated by the organization: creating the portfolio; assessing and analyzing the portfolio characteristics based on risk, benefits, alignment, criticality, and cost; and balancing decisions to start projects or terminate under-performing IT assets such as servers and applications. The spirit of IT PoM was interpreted differently by different stakeholders (data providers, business units, and IT PoM team) leading to resistance to implementation. The case data underscores the importance of establishing a governance steering committee and new internal structures to help push the balancing decisions across the organization. Research limitations/implications The results are useful in developing guidelines and strategies to achieve successful implementation of IT PoM and to highlight critical factors that practitioners need to pay close attention to during an IT PoM implementation. Originality/value This study represents one of the first attempts to describe a detailed IT PoM implementation process and how IT PoM appropriation process can lead to improved decision making within the organization.

Collaboration


Dive into the Chandrasekar Subramaniam's collaboration.

Top Co-Authors

Avatar

Sungjune Park

University of North Carolina at Charlotte

View shared research outputs
Top Co-Authors

Avatar

Ram L. Kumar

University of North Carolina at Charlotte

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Xiaoran Wu

University of North Carolina at Charlotte

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Antonis C. Stylianou

University of North Carolina at Charlotte

View shared research outputs
Top Co-Authors

Avatar

Jing Zhou

University of North Carolina at Charlotte

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Kexin Zhao

University of North Carolina at Charlotte

View shared research outputs
Researchain Logo
Decentralizing Knowledge