• Log In
  • Skip to main content
  • Skip to primary sidebar

MIS Distinguished Speaker Series

Temple University

You are here: Home / Archives for simulation

simulation

Dec 3 – Jingjing Zhang to present “Longitudinal Impact of Preference Biases on Recommender Systems’ Performance”

November 30, 2021 By Sezgin Ayabakan

Longitudinal Impact of Preference Biases on Recommender Systems’ Performance

by

Jingjing Zhang

Associate Professor
Fettig/Whirlpool Faculty Fellow
Department of Operations & Decision Technologies
Kelley School of Business
Indiana University

Friday, Dec 3

10:30am – 12 pm | Alter 603

Abstact:

Research studies have shown that recommender systems’ predictions that are observed by users can cause biases in users’ post-consumption preference ratings. Because users’ preference ratings are typically fed back to the system as training data for future predictions, this process is likely to influence the performance of the system in the long run. We use a simulation approach to study the longitudinal impact of preference biases (and their magnitude) on the dynamics of recommender systems’ performance. We look at the influence of preference biases in two conditions: (i) during the normal system use, where biases are typically caused by the system’s inherent prediction errors, and (ii) in the presence of external (deliberate) recommendation perturbations. Our simulation results show that preference biases significantly impair the system’s prediction performance (i.e., prediction accuracy) as well as users’ consumption outcomes (i.e., consumption relevance and diversity) over time. The impact is non-linear to the size of the bias, i.e., large bias causes disproportionately large negative effects. Also, items that are less popular and less distinctive (in terms of their content) are affected more by preference biases. Additionally, intentional recommendation perturbations, even on a small number of items for a short time, substantially amplify the negative impact of preference bias on a system’s longitudinal dynamics and causes long-lasting effects on users’ consumption. Our findings provide important implications for the design of recommender systems.

Tagged With: bias, prediction, prediction performance, preference biases, recommender systems, simulation, user consumption

Nov 12 – Sumit Sarkar to present “Modeling User Choice to Compose Offer Sets”

November 9, 2021 By Sezgin Ayabakan

Modeling User Choice to Compose Offer Sets

by

Sumit Sarkar

Charles and Nancy Davidson Chair
Professor of Information Systems
Director, PhD Programs
Naveen Jindal School of Management
The University of Texas at Dallas

Friday, Nov 12

10 – 11 am | Zoom

Abstact:

Firms are increasingly using clickstream and transactional data to tailor product offerings to visitors (users) at their site. The sites have the opportunity, at each interaction (i.e., whenever a user clicks on a link), to offer multiple items (referred to as an offer set) that might be of interest to the user. By displaying links to multiple items, the site hopes to increase the chance that the user will find at least one of those items to be interesting, thereby increasing the probability the user will make a purchase. We examine the problem of composing an offer set that maximizes the firm’s expected payoff over a user’s session, which would typically include multiple interactions. An offer set provided to a user has important implications: the composition of the offer set impacts the immediate choice of the user (item externality), and the user’s choice in one interaction may influence the subsequent actions the user will take during that session. Hence, in order to determine the full impact of an offer set, it is necessary to consider not only the likelihood of the user purchasing one of the offered items, but to also evaluate how it may impact the choices of a user at subsequent interactions. By providing the right offer set a site can guide a user to paths that lead to items with higher likelihood of conversion while simultaneously learning what other items the user may examine (view) before making a purchase. We show that identifying the optimal offer set is a difficult problem in general, and develop an efficient heuristic that can be used in real time. Simulated experiments based on real data show that the joint consideration of item externalities and of looking ahead lead to both higher conversion rates and longer user sessions on average, and consequently to increased total sales.

Tagged With: heuristic, item externality, offer set, simulation, user choice

Mar 19 – Jungpil Hahn to present “The Impact of End-User Privacy Enhancing Technologies (PETs) on Firms’ Analytics Performance”

March 15, 2021 By Sezgin Ayabakan

The Impact of End-User Privacy Enhancing Technologies (PETs) on Firms’ Analytics Performance

by

Jungpil Hahn

Associate Professor
Head, Department of Information Systems and Analytics
School of Computing
National University of Singapore

Friday, Mar 19

9 – 10 am | Zoom

(send an email to ayabakan@temple.edu to get the Zoom link)

Abstact:

Big data analytics in digital commerce requires vast amounts of personal information from consumers, but this gives rise to major privacy concerns. To combat the threat of privacy invasion, more and more individuals are proactively adopting privacy enhancing technologies (PETs) to protect their personal information. Consumers’ adoption of PETs may hamper firms’ big data analytics capabilities and performance but our knowledge of how PETs impact firms’ data analytics is rather limited. This study proposes a theoretical framework to better understand how consumers’ use of PETs will affect firms’ analytics performance by way of inducing measurement error and/or missing values with regards to entities, attributes and relationships in firms’ customer databases. However, the impact of specific end-user PETs may vary by analytics use cases. We conduct a computational study to investigate and quantify the impact of consumer PET use on product recommendation performance. Our simulation experiments find that consumers’ adoption characteristics (adoption rate and pattern) and PETs characteristics (protection mechanism and intensity) significantly affect the performance of product recommendation systems.

Tagged With: Big Data, big data analytics capabilities, computational study, firm performance, Privacy Enhancing Technologies, simulation

Nov 13 – Jan Recker to present “Towards a Dynamic Network Theory of Organizing and Emerging Technology”

November 9, 2020 By Sezgin Ayabakan

Towards a Dynamic Network Theory of Organizing and Emerging Technology

by

Jan Recker

Alexander-von-Humboldt Fellow
Chaired Professor for Information Systems
University of Cologne

Friday, Nov 13

10 – 11 am | Zoom

(send an email to ayabakan@temple.edu to get the Zoom link)

Abstact:

Current thinking about emerging technology tends to focus on features and affordances of single artifacts, often in isolation, inserted into one existing way of organizing, often a single process. In contrast, we propose a theory that is focused on networks of relations between technology-enabled actions in a dynamic network of organizing. Our theory offers a novel explanation for how emerging technology can generate rapid, transformative change in how we organize our actions. We build on current theories of network dynamics and technology-in-use and consider what happens to an on-going pattern of action when new artifacts arrive on the scene, i.e., when emerging technology influences the emergence of organizing paths in the network. We use a computer-based simulation to demonstrate our theory. Our specific contribution resides in the focus on network paths as a central explanatory mechanism for emergent, transformative change.

Tagged With: Dynamic Network Theory, Emerging Technology, simulation

Feb 25: Steven Johnson to speak on How do power law distributions arise in online communities?

February 23, 2011 By Sunil Wattal

Steven Johnson

Assistant Professor,
Fox School of Business,
Temple University

February 25, 2011

Speakman Hall 200, 1000am – 1130am

Seminar Title : How do power law distributions arise in online communities?

Abstract

Power law rank/frequency distributions appear ubiquitous in online communities but the mechanisms of their formation are not well understood. This study models online communities and multiple network formation mechanisms that can lead to the emergence of power distributions. First, we establish the presence of power law distributions in twenty-eight online communities. Next, we develop a simulation model of the formation of thread-based asynchronous online communities and provide results based on over 4,500 runs of the model simulating a total of over 3,200,000 messages generated by over 340,000 participants. Finally, we evaluate if these network formation models generate simulated networks with power law distributions. To validate that these models are consistent with the observed networks we use multiple measures of network structure: the power law distribution degree, network density, mutuality index and clustering coefficient. This study contributes to our understanding of online communities and other social communication networks by illuminating the relationships between specific behavioral tendencies of participants and emergent structural network characteristics.

We find no evidence that preferential attachment explains the presence of power laws in online communities but instead that a generalized social exchange mechanism is the participant behavior most consistent with observed power laws.

Please email me for a copy of the full paper (swattal@temple.edu).


Tagged With: gift economy, Online Communities, power-law distribution, preferential attachment, scale-free, simulation, social exchange, steven johnson, temple univ

Primary Sidebar

RSS MIS News

  • AIS Student Chapter Leadership Conference 2025 April 17, 2025
  • Temple AIS wins at the 2024 AIS Software Innovation Challenge! January 15, 2025
  • 10 Week Summer Internship in CyberSecurity October 7, 2024
  • Volunteer for Cybersecurity Awareness Month October 7, 2024
  • MIS faculty awarded promotions June 17, 2024

Tags

AI amrit tiwana Artificial Intelligence blockchain boston college bots brian butler carnegie mellon univ crowd culture deception Deep Learning Design experiment Field Experiment financial technology georgia state georgia tech Healthcare Human vs AI information security Innovation Institutional Theory IT Outsourcing long tail Machine Learning machines Maryland media Online Communities platform privacy productivity Quasi-natural experiment recommender systems simulation Social Capital social media social network steven johnson technology adoption temple univ user generated content UT Dallas wharton

Archives

Copyright © 2025 Department of Management Information Systems · Fox School of Business · Temple University