Time filter

Source Type

Sainte Catherine de la Jacques Cartier, Canada

HEC Montréal , is the independent affiliated business school of the Université de Montréal, and the second oldest management School in Canada. It holds accreditations from AACSB, EQUIS and AMBA, one of two schools in North America to hold triple accreditation in management education. The full name of HEC Montreal was École des Hautes Études Commerciales; the school was renamed HEC Montréal in 2002. The School is not related to the HEC Lausanne or the HEC Paris. It is known for its international atmosphere, with one third of the students and 40% of professors coming from abroad, and favours a multilingual approach to business education, offering bilingual and trilingual bachelor's degrees, and graduate degrees both in English and in French. Wikipedia.

Delage E.,HEC Montreal | Ye Y.,Stanford University
Operations Research | Year: 2010

We propose a robust optimization approach to address a multiperiod inventory control problem under ambiguous demands,that is, only limited information of the demand distributions such as mean, support, and some measures of deviations. Our framework extends to correlated demands and is developed around a factor-based model, which has the ability to incorporate business factors as well as time-series forecast effects of trend, seasonality, and cyclic variations. We can obtain the parameters of the replenishment policies by solving a tractable deterministic optimization problem in the form of a second-order cone optimization problem (SOCP), with solution time; unlike dynamic programming approaches, it is polynomial and independent on parameters such as replenishment lead time, demand variability, and correlations. Theproposed truncated linear replenishment policy (TLRP), which is piecewise linear with respect to demand history, improves upon static and linear policies, and achieves objective values that are reasonably close to optimal. © 2010 INFORMS.

Delage E.,HEC Montreal | Mannor S.,McGill University
Operations Research | Year: 2010

Markov decision processes are an effective tool in modeling decision making in uncertain dynamic environments. Because the parameters of these models typically are estimated from data or learned from experience, it is not surprising that the actual performance of a chosen strategy often differs significantly from the designer's initial expectations due to unavoidable modeling ambiguity. In this paper, we present a set of percentile criteria that are conceptually natural and representative of the trade-off between optimistic and pessimistic views of the question. We study the use of these criteria under different forms of uncertainty for both the rewards and the transitions. Some forms are shown to be efficiently solvable and others highly intractable. In each case, we outline solution concepts that take parametric uncertainty into account in the process of decision making. © 2010 INFORMS.

Spears J.L.,DePaul University | Barki H.,HEC Montreal
MIS Quarterly: Management Information Systems | Year: 2010

This paper examines user participation in information systems security risk management and its influence in the context of regulatory compliance via a multi-method study at the organizational level. First, eleven informants across five organizations were interviewed to gain an understanding of the types of activities and security controls in which users participated as part of Sarbanes-Oxley compliance, along with associated outcomes. A research model was developed based on the findings of the qualitative study and extant user participation theories in the systems development literature. Analysis of the data collected in a questionnaire survey of 228 members of ISACA, a professional association specialized in information technology governance, audit, and security, supported the research model. The findings of the two studies converged and indicated that user participation contributed to improved security control performance through greater awareness, greater alignment between IS security risk management and the business environment, and improved control development. While the IS security literature often portrays users as the weak link in security, the current study suggests that users may be an important resource to IS security by providing needed business knowledge that contributes to more effective security measures. User participation is also a means to engage users in protecting sensitive information in their business processes.

De Guinea A.O.,HEC Montreal | Webster J.,Queens University
MIS Quarterly: Management Information Systems | Year: 2013

Information systems use represents one of the core concepts defining the discipline. In this article, we develop a rich conceptualization of IS use patterns as individuals' emotions, cognition, and behaviors while employing an information technology to accomplish a work-related task. By combining two novel perspectives-the affect-object paradigm and automaticity-with coping theory, we theorize how different patterns appear and disappear as a result of different IT events-expected and discrepant-as well as over time, and how these patterns influence short-term performance. In order to test our hypotheses, we conducted two studies, one qualitative and the other quantitative, that combined different methods (e.g., open-ended questions, physiological data, videos, protocol analysis) to study the influence of expected and discrepant events. The synergistic properties of the two studies demonstrate the existence of two IS use patterns, automatic and adjusting. Most interactions are automatic, and adjusting patterns, triggered by discrepant IT events, fade over time and transition into automatic ones. Further, automatic patterns result in enhanced short-term performance, while adjusting ones do not. Our conceptualization of IS use patterns is useful because it addresses important questions (such as why negative IT perceptions persist) and clarifies that it is how (rather than how much) people use IT that is pertinent for performance.

BACKGROUND: Home telemonitoring figures among the various solutions that could help attenuate some of the problems associated with aging populations, rates of chronic illness, and shortages of health professionals. OBJECTIVE: The primary aim of this study was to further our understanding of the clinical effects associated with home telemonitoring programs in the context of chronic diseases. METHODS: We conducted a systematic review which covered studies published between January 1966 and December 2008. MEDLINE, The Cochrane Library, and the INAHTA (International Network of Agencies for Health Technology Assessment) database were consulted. Our inclusion criteria consisted of: (1) English language publications in peer-reviewed journals or conference proceedings and (2) studies involving patients with diabetes, asthma, heart failure, or hypertension, and presenting results on the clinical effects of home telemonitoring. RESULTS: In all, 62 empirical studies were analyzed. The results from studies involving patients with diabetes indicated a trend toward patients with home telemonitoring achieving better glycemic control. In most trials in which patients with asthma were enrolled, results showed significant improvements in patients' peak expiratory flows, significant reductions in the symptoms associated with this illness, and improvements in perceived quality of life. Virtually all studies involving patients with hypertension demonstrated the ability of home telemonitoring to reduce systolic and/or diastolic blood pressure. Lastly, due to the equivocal nature of current findings of home telemonitoring involving patients with heart failure, larger trials are still needed to confirm the clinical effects of this technology for these patients. CONCLUSIONS: Although home telemonitoring appears to be a promising approach to patient management, designers of future studies should consider ways to make this technology more effective as well as controlling possible mediating variables.

Discover hidden collaborations